Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cfrv_4_0_setup_ALL.exe

Overview

General Information

Sample name:cfrv_4_0_setup_ALL.exe
Analysis ID:1542302
MD5:9197aeadf996dd8cd3885a205927671e
SHA1:3bf1368b4dae680e580d3958299f9636e255cba8
SHA256:94e6740812caeb857ef6065984ab4138d56ad4b517c62f2611f303eab519676c
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

May use the Tor software to hide its network traffic
Sigma detected: Files With System Process Name In Unsuspected Locations
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Creates Visual Basic Runtime Dlls
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file contains strange resources
PE file does not import any functions
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Registers a DLL
Sample file is different than original file name gathered from version info
Sigma detected: Explorer Process Tree Break
Sigma detected: Suspicious Msiexec Execute Arbitrary DLL
Sigma detected: Use NTFS Short Name in Command Line
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • cfrv_4_0_setup_ALL.exe (PID: 1508 cmdline: "C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe" MD5: 9197AEADF996DD8CD3885A205927671E)
    • cfrv_4_0_setup_ALL.exe (PID: 980 cmdline: .\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k="" MD5: 3B2D532673D1567116105D04C621CDBA)
      • regsvr32.exe (PID: 1852 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\mscomctl.ocx" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 6120 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMDLG32.OCX" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 5180 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMCT332.OCX" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 1104 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\TABCTL32.OCX" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 6100 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Program Files (x86)\Common Files\microsoft shared\DAO\DAO350.DLL" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 2172 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_CR_control.dll" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 5696 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_DB_Connect.dll" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 5444 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Data.dll" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 3608 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Export.dll" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 3568 cmdline: "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_Rmt_DB4_Update.dll" /s MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • explorer.exe (PID: 7244 cmdline: "C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d} MD5: 662F4F92FDE3557E86D110526BB578D5)
  • msiexec.exe (PID: 3620 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 3236 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 69C5C113DED231894CD03AC8E1DE281B MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 4996 cmdline: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll" MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 1888 cmdline: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crviewer.dll" MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 3512 cmdline: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\Crystal\Cdo32.dll" MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 2504 cmdline: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crtslv.dll" MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 4228 cmdline: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\ExportModeller.dll" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • explorer.exe (PID: 7280 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\cfrv_4_0_setup_ALL.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000000.1800908445.0000000000401000.00000020.00000001.01000000.00000004.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        Process Memory Space: cfrv_4_0_setup_ALL.exe PID: 1508JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          SourceRuleDescriptionAuthorStrings
          1.0.cfrv_4_0_setup_ALL.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

            System Summary

            barindex
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe, ProcessId: 1508, TargetFilename: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiexec.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), @gott_cyber: Data: Command: "C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d}, CommandLine: "C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d}, CommandLine|base64offset|contains: j, Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: .\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k="", ParentImage: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe, ParentProcessId: 980, ParentProcessName: cfrv_4_0_setup_ALL.exe, ProcessCommandLine: "C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d}, ProcessId: 7244, ProcessName: explorer.exe
            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll", CommandLine: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\msiexec.exe, NewProcessName: C:\Windows\SysWOW64\msiexec.exe, OriginalFileName: C:\Windows\SysWOW64\msiexec.exe, ParentCommandLine: C:\Windows\system32\msiexec.exe /V, ParentImage: C:\Windows\System32\msiexec.exe, ParentProcessId: 3620, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll", ProcessId: 4996, ProcessName: msiexec.exe
            Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: .\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k="", CommandLine: .\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k="", CommandLine|base64offset|contains: , Image: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe, NewProcessName: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe, OriginalFileName: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe, ParentCommandLine: "C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe", ParentImage: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe, ParentProcessId: 1508, ParentProcessName: cfrv_4_0_setup_ALL.exe, ProcessCommandLine: .\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k="", ProcessId: 980, ProcessName: cfrv_4_0_setup_ALL.exe
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results
            Source: cfrv_4_0_setup_ALL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: c:\tmp\log\installs\CF_Remote\install.logJump to behavior
            Source: Binary string: MsiHnd.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: MsiHnd.pdbV source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: shfolder.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rF,c:\Windows\System32\ImgXTwain61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: shfolder.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: GameuxInstallHelper.pdb source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: gacutil.pdb source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: c:\Windows\System32\ImgX61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: gacutil.pdb(0 source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: sdbapiu.pdbU source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: usp10.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: c:\Windows\System32\ImgXPrint61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msisip.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp, msisip.dll.0.dr
            Source: Binary string: rFXc:\Windows\System32\ImgX61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: sdbapiu.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: riched20.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mspatcha.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Y:\EPFXlate\HTML\ReleaseSym\exlate32.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msi.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000057C3000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: c:\Windows\System32\ImgXTwain61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rFWc:\Windows\System32\ImgX61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: gacutil.pdb, AH/@ source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: sdbapi.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msi_l.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: usp10.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: imagehlp.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msi.pdbh source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000057C3000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mspatcha.pdbtvbl01\LOCALS~1\Temp\2\DBGtoPDB\mspatcha.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: imagehlp.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: riched20.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Y:\EPFXlate\HTML\ReleaseSym\exlate32.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: sdbapi.pdbU source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: tvbl01\LOCALS~1\Temp\2\DBGtoPDB\mspatcha.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rF,c:\Windows\System32\ImgXPrint61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msisip.pdb3 source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp, msisip.dll.0.dr
            Source: Binary string: gacutlrc.pdb source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Windows\System32\msiexec.exeFile opened: z:
            Source: C:\Windows\System32\msiexec.exeFile opened: x:
            Source: C:\Windows\System32\msiexec.exeFile opened: v:
            Source: C:\Windows\System32\msiexec.exeFile opened: t:
            Source: C:\Windows\System32\msiexec.exeFile opened: r:
            Source: C:\Windows\System32\msiexec.exeFile opened: p:
            Source: C:\Windows\System32\msiexec.exeFile opened: n:
            Source: C:\Windows\System32\msiexec.exeFile opened: l:
            Source: C:\Windows\System32\msiexec.exeFile opened: j:
            Source: C:\Windows\System32\msiexec.exeFile opened: h:
            Source: C:\Windows\System32\msiexec.exeFile opened: f:
            Source: C:\Windows\System32\msiexec.exeFile opened: b:
            Source: C:\Windows\System32\msiexec.exeFile opened: y:
            Source: C:\Windows\System32\msiexec.exeFile opened: w:
            Source: C:\Windows\System32\msiexec.exeFile opened: u:
            Source: C:\Windows\System32\msiexec.exeFile opened: s:
            Source: C:\Windows\System32\msiexec.exeFile opened: q:
            Source: C:\Windows\System32\msiexec.exeFile opened: o:
            Source: C:\Windows\System32\msiexec.exeFile opened: m:
            Source: C:\Windows\System32\msiexec.exeFile opened: k:
            Source: C:\Windows\System32\msiexec.exeFile opened: i:
            Source: C:\Windows\System32\msiexec.exeFile opened: g:
            Source: C:\Windows\System32\msiexec.exeFile opened: e:
            Source: C:\Windows\explorer.exeFile opened: c:
            Source: C:\Windows\System32\msiexec.exeFile opened: a:
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00407E20 FindNextFileW,FindClose,FindFirstFileW,FindFirstFileW,0_2_00407E20
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C822A30 _memset,FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,1_2_6C822A30
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C812470 FindClose,FindFirstFileW,FindFirstFileW,1_2_6C812470
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start MenuJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start Menu\ProgramsJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\MicrosoftJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Campaign Finance\CF Remote.lnkJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Campaign FinanceJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\WindowsJump to behavior
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002854000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.MYWEBSITE.COM/NEW
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002813000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.NCSBE.GOVMICROSOFT
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteCodeSigningCA.crl0
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawtePremiumServerCA.crl0
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://repository.certum.pl/ctnca.cer09
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.0000000000418000.00000020.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://standards.iso.org/iso/19770/-2/2008/schema.xsd
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://subca.ocsp-certum.com01
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://subca.ocsp-certum.com02
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://subca.ocsp-certum.com05
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ImgX.net/
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ImgX.net/ImgX/purchase.asp
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.certum.pl/CPS0
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.0000000000418000.00000020.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/0
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/InstallAware
            Source: cfrv_4_0_setup_ALL.exeString found in binary or memory: http://www.installaware.comz
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002854000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/New
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002854000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ncsbe.gov
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ncsbe.govMicrosoft
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.seagatesoftware.com/xml/schema.xsdxsddtdw
            Source: explorer.exe, 00000018.00000002.2963285066.0000000005258000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3kl
            Source: explorer.exe, 00000018.00000002.2963285066.0000000005258000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmley
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0C
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFC7D000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.00000000007AE000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.installaware.com/buydirect.aspopen
            Source: Yara matchFile source: Process Memory Space: cfrv_4_0_setup_ALL.exe PID: 1508, type: MEMORYSTR
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msi.catJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\msvbvm60.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Windows\NCSBOEJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Windows\system32\myah0.cplJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6194f5.msi
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI961D.tmp
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9709.tmp
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{152D390A-DD7B-4E57-B3A5-14CADE7E1207}
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9748.tmp
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9788.tmp
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipi
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI97F6.tmp
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Crpe32.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Crpaig80.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Implode.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crwrap32.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\craxdrt.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crviewer.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\sscsdk80.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\pg32conv.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\P2smon.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\Cdo32.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\p2ixbse.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\p2lodbc.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\p2sodbc.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\exlate32.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\QECR.LIC
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRBAS15.DLL
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRBAS15R.DLL
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRUTL15.DLL
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRUTL15R.DLL
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15.DLL
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15R.DLL
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15S.DLL
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRxmlx07.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRxmlx07r.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lsamp1.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u25dts.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2ldts.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lfinra.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lexch.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2l2000.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u252000.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lcom.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\Crxlat32.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dapp.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2ddisk.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dmapi.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dnotes.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dpost.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dvim.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fcr.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fhtml.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\crxf_pdf.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crtslv.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\ExportModeller.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\crxf_rtf.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fsepv.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fxml.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fxls.dll
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6194f8.msi
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6194f8.msi
            Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI961D.tmp
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0040B1D00_2_0040B1D0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00419D200_2_00419D20
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0041FF600_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004010000_2_00401000
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004011000_2_00401100
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004011C00_2_004011C0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004011D80_2_004011D8
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004091800_2_00409180
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004042D00_2_004042D0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0040F2F00_2_0040F2F0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004013F00_2_004013F0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004234D00_2_004234D0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004105D00_2_004105D0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004055E00_2_004055E0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004045A00_2_004045A0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004015B00_2_004015B0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0040E7400_2_0040E740
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004037600_2_00403760
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00425AE70_2_00425AE7
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00401AB00_2_00401AB0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00412B500_2_00412B50
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0040DC000_2_0040DC00
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_100010001_2_10001000
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_100090281_2_10009028
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_100173301_2_10017330
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_100153E01_2_100153E0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1000D4501_2_1000D450
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1001E5C31_2_1001E5C3
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_100177101_2_10017710
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1001E7511_2_1001E751
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1000E7701_2_1000E770
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_100127E01_2_100127E0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1001E82B1_2_1001E82B
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_100178D01_2_100178D0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1000C8E01_2_1000C8E0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10014A401_2_10014A40
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1000EB101_2_1000EB10
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1000CCA01_2_1000CCA0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1001AD1A1_2_1001AD1A
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10016D801_2_10016D80
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10017DC01_2_10017DC0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10012F001_2_10012F00
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10016F801_2_10016F80
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C814C001_2_6C814C00
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C80AE701_2_6C80AE70
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C81E9501_2_6C81E950
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C808AB01_2_6C808AB0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C8064601_2_6C806460
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C8135F01_2_6C8135F0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C81FEE01_2_6C81FEE0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C828E1B1_2_6C828E1B
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C81B9C01_2_6C81B9C0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C80B4471_2_6C80B447
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C82E6B01_2_6C82E6B0
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C80E6701_2_6C80E670
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C82E78B1_2_6C82E78B
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C80D1B01_2_6C80D1B0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: String function: 00405140 appears 35 times
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: String function: 00423A98 appears 36 times
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: String function: 10018EB0 appears 94 times
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: String function: 6C827AA4 appears 37 times
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: String function: 6C804C80 appears 39 times
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
            Source: msi.dll.0.drStatic PE information: Resource name: None type: DOS executable (COM)
            Source: msi.dll0.0.drStatic PE information: Resource name: None type: DOS executable (COM)
            Source: crviewer.dll.0.drStatic PE information: Resource name: None type: GLS_BINARY_LSB_FIRST
            Source: crviewer.dll.0.drStatic PE information: Resource name: None type: GLS_BINARY_LSB_FIRST
            Source: crviewer.dll.0.drStatic PE information: Resource name: None type: GLS_BINARY_LSB_FIRST
            Source: crviewer.dll.0.drStatic PE information: Resource name: None type: GLS_BINARY_LSB_FIRST
            Source: crviewer.dll.0.drStatic PE information: Resource name: None type: GLS_BINARY_LSB_FIRST
            Source: crviewer.dll.0.drStatic PE information: Resource name: None type: GLS_BINARY_LSB_FIRST
            Source: crviewer.dll.0.drStatic PE information: Resource name: None type: GLS_BINARY_LSB_FIRST
            Source: stdole2.tlb.0.drStatic PE information: No import functions for PE file found
            Source: CRxmlx07r.dll.0.drStatic PE information: No import functions for PE file found
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSSubTmr6.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu252000.dllP vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameU25dts.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuxdapp.dllP vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuxddisk.dllDisk file vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuxdmapi.dll" vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuxdnotes.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006562000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSSCsdk32.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006A5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevbalColumnTreeView6.ocx, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSLS31.DLLR vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1798907879.0000000002359000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCS40_CA.DLLj% vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSLS31.DLLR vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspatcha.dll: vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006820000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImgX61.ocx, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000058DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsi.dllD vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1799215868.0000000007140000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCS40_CA.DLLj% vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006B1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006659000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu2fxml.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006659000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu2l2000.dllP vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006659000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu2lcom.dll@ vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000534D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLogFile.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000068C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSChart.ocx@ vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1799215868.0000000007160000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCS40_CA.DLLj% vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000050ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCS40_CA.DLLj% vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUXDPOST.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuxdvim.dllP vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuxfcr.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu2fhtml.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuxfsepv.dllD vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUxfxls.dll" vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005346000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLogFile.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImgXPrint61.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImgXTwain61.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameimplode.dllL vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005723000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsi.dllX vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000510D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCS40_CA.DLLj% vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000510D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEXLATE32.DLL" vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExportModeller.DLL vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameimagehlp.dllz- vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImgX61.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOLEPRO32.DLL( vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamep2ixbse.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepdlodbc.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamep2smon.dll@ vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamep2sodbc.dll" vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VerQueryValueAGetFileVersionInfoAGetFileVersionInfoSizeALegalCopyrightInternalNameOriginalFilenameFileVersionProductNameCompanyNameFileDescriptionProductVersionDOSWIN32WIN16NONETAGIDTAGSTRTAB_ITEMINDEX_BITSINDEX_KEYINDEX_TAGINDEXINDEXESSTRINGTABLEMATCH_MODEDATABASE_ID(GUID)MSI_PACKAGE_ID(GUID)DATA_BITSEXE_ID(GUID)FILE_BITSPATCH_BITSFLAGS_NTVDM3FLAGS_NTVDM2FLAGS_NTVDM1DATA_QWORDUPTO_BIN_FILE_VERSIONUPTO_BIN_PRODUCT_VERSIONFLAG_MASK_SHELLFLAG_MASK_USERFLAG_MASK_KERNELMODTIMEBIN_PRODUCT_VERSIONBIN_FILE_VERSIONTIMEAPPLY_ALL_SHIMSMATCH_LOGIC_NOTGENERALINCLUDERUNTIME_PLATFORMMSI_TRANSFORM_TAGIDDATA_DWORDVALUETYPEFLAGSENGINEAPPHELP_LANGIDINDEXFLAGSHTMLHELPIDPROBLEM_SEVERITYPREVOSBUILDNOPREVOSPLATFORMIDPREVOSMINORVERSIONPREVOSMAJORVERSIONVER_LANGUAGEOS_SERVICE_PACKUPTO_LINK_DATELINK_DATELINKER_VERSIONPE_CHECKSUMVERFILETYPEVERFILEOSVERFILEDATELOVERFILEDATEHIMODULE_TYPEFLAG_TAGIDLAYER_TAGIDPATCH_TAGIDSHIM_TAGIDCHECKSUMOFFSETSIZECOMPILER_VERSIONLAYER_DISPLAYNAMES16BIT_MODULE_NAMEMSI_TRANSFORM_FILEDATA_STRINGSXS_MANIFESTAPPHELP_CONTACTAPPHELP_TITLELINK_TEXTLINK_URLPROBLEM_DETAILSS16BIT_DESCRIPTIONLEGAL_COPYRIGHTINTERNAL_NAMEORIGINAL_FILENAMEFILE_VERSIONFILE_DESCRIPTIONPRODUCT_VERSIONPRODUCT_NAMEWILDCARD_NAMECOMPANY_NAMECOMMAND_LINEDLLFILEAPP_NAMEVENDORAPIMODULEDESCRIPTIONNAMEMSI CUSTOM ACTIONMSI PACKAGEMSI TRANSFORM REFMSI TRANSFORMDATALINKAPPHELPFILELAYERFLAG_REFPATCH_REFSHIM_REFMATCHING_FILEEXEAPPFLAGPATCHSHIMINEXCLUDELIBRARYDATABASETagToIndexInvalid attribute 0x%x. vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesdbapi.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VerQueryValueWGetFileVersionInfoWGetFileVersionInfoSizeWLegalCopyrightInternalNameOriginalFilenameFileVersionProductNameCompanyNameFileDescriptionProductVersionDOSWIN32WIN16NONETAGIDTAGSTRTAB_ITEMINDEX_BITSINDEX_KEYINDEX_TAGINDEXINDEXESSTRINGTABLEMATCH_MODEDATABASE_ID(GUID)MSI_PACKAGE_ID(GUID)DATA_BITSEXE_ID(GUID)FILE_BITSPATCH_BITSFLAGS_NTVDM3FLAGS_NTVDM2FLAGS_NTVDM1DATA_QWORDUPTO_BIN_FILE_VERSIONUPTO_BIN_PRODUCT_VERSIONFLAG_MASK_SHELLFLAG_MASK_USERFLAG_MASK_KERNELMODTIMEBIN_PRODUCT_VERSIONBIN_FILE_VERSIONTIMEAPPLY_ALL_SHIMSMATCH_LOGIC_NOTGENERALINCLUDERUNTIME_PLATFORMMSI_TRANSFORM_TAGIDDATA_DWORDVALUETYPEFLAGSENGINEAPPHELP_LANGIDINDEXFLAGSHTMLHELPIDPROBLEM_SEVERITYPREVOSBUILDNOPREVOSPLATFORMIDPREVOSMINORVERSIONPREVOSMAJORVERSIONVER_LANGUAGEOS_SERVICE_PACKUPTO_LINK_DATELINK_DATELINKER_VERSIONPE_CHECKSUMVERFILETYPEVERFILEOSVERFILEDATELOVERFILEDATEHIMODULE_TYPEFLAG_TAGIDLAYER_TAGIDPATCH_TAGIDSHIM_TAGIDCHECKSUMOFFSETSIZECOMPILER_VERSIONLAYER_DISPLAYNAMES16BIT_MODULE_NAMEMSI_TRANSFORM_FILEDATA_STRINGSXS_MANIFESTAPPHELP_CONTACTAPPHELP_TITLELINK_TEXTLINK_URLPROBLEM_DETAILSS16BIT_DESCRIPTIONLEGAL_COPYRIGHTINTERNAL_NAMEORIGINAL_FILENAMEFILE_VERSIONFILE_DESCRIPTIONPRODUCT_VERSIONPRODUCT_NAMEWILDCARD_NAMECOMPANY_NAMECOMMAND_LINEDLLFILEAPP_NAMEVENDORAPIMODULEDESCRIPTIONNAMEMSI CUSTOM ACTIONMSI PACKAGEMSI TRANSFORM REFMSI TRANSFORMDATALINKAPPHELPFILELAYERFLAG_REFPATCH_REFSHIM_REFMATCHING_FILEEXEAPPFLAGPATCHSHIMINEXCLUDELIBRARYDATABASETagToIndexInvalid attribute 0x%x. vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000069B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSCOMCTL.OCX2 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsihnd.dllX vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsihnd.dllD vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsimsg.dllX vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSISIP.DLLX vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSISIP.DLLD vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameU2ldts.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu2lexch.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu2lfinra.dll2FRCurrentRatio(CurrentAssets, CurrentLiabilities)=FRQuickRatio(CurrentAssets, Inventories, CurrentLiabilities)1FRDebtEquityRatio(TotalLiabilities, TotalEquity)0FREquityVsTotalAssets(TotalEquity, TotalAssets)$FRNetProfitMargin(NetProfit, Sales)(FRGrossProfitMargin(GrossProfit, Sales)0FROperatingProfitMargin(OperatingProfit, Sales)/FRInterestCoverage(CashFlow, InterestExpenses)+FRCashFlowVsTotalDebt(CashFlow, TotalDebt))FRReturnOnEquity(NetProfit, TotalEquity)4FRReturnOnNetFixedAssets(NetProfit, NetFixedAssets).FRReturnOnTotalAssets(NetProfit, TotalAssets)BFRReturnOnInvestedCapital(NetProfit, TotalBankDebts, TotalEquity)CFRReturnOnCommonEquity(NetProfit, PreferredDividend, CommonEquity)IFREarningsPerCommonShare(NetProfit, PreferredDividend, NumOfCommonShare)6FRAccRecTurnover(AccountReceivable, Sales, NumOfDays)1FRInventoryTurnover(Inventory, Sales, NumOfDays)4FRPriceEarningsRatio(MarketPrice, EarningsPerShare)'FRDividendYield(Dividend, MarketPrice) vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameu2lsamp1.dll vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUniscribe vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevbalFlBr6.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameW95INF16.DLL5%ProductNameMicrosoft vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameW95INF32.DLLj% vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCF_Login.ocx, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCF_Transaction.ocx, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomct332.ocx, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMDLG32.OCX2 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000002.2329127975.00000000056A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEXPLORER.EXEj% vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2115201202.00000000056F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameahadmin_wrapper.dll4 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameahadmin_.dll4 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameGameuxInstallHelper.DLLb! vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameManagedVCL.Utils.dll8 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamegacutil.exeT vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamegacutlrc.dllT vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamez vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1813553696.00000000FFE03000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameahadmin_wrapper.dll4 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameahadmin_.dll4 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGameuxInstallHelper.DLLb! vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagedVCL.Utils.dll8 vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutil.exeT vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutlrc.dllT vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamez vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutil.exeT vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamez vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutlrc.dllT vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2114952352.0000000005731000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2326010167.00000000056FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs cfrv_4_0_setup_ALL.exe
            Source: cfrv_4_0_setup_ALL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4*\AC:\SteveMac\VB6\Develop\vbalFolderBrowse\vbalFolderBrowse6.vbp,
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006568000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .*\AC:\SteveMac\VB6\XHELPE~1\SSubTmr\SubTimer6.vbp
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TRUE|*.wse;*.zip;*.vbp;*.vbw;*.vbg;*.frm;*.frx;*.bas;*.cls;*.ctl;*.ctx
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006A5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GD*\AC:\SteveMac\VB6\Controls\vbalTreeView6\MultiColumn\vbalColumnTreeViewLib6.vbp
            Source: classification engineClassification label: mal48.evad.winEXE@39/565@0/0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0041B110 GetLastError,FormatMessageW,LocalFree,0_2_0041B110
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0041F320 GetVersion,CoCreateInstance,0_2_0041F320
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C822980 LoadResource,SizeofResource,LockResource,CreateFileW,WriteFile,CloseHandle,DeleteFileW,1_2_6C822980
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\SBoE
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\IIIQFJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeMutant created: NULL
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1Jump to behavior
            Source: Yara matchFile source: 1.0.cfrv_4_0_setup_ALL.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000000.1800908445.0000000000401000.00000020.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\cfrv_4_0_setup_ALL.exe, type: DROPPED
            Source: Yara matchFile source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe, type: DROPPED
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\explorer.exe
            Source: unknownProcess created: C:\Windows\explorer.exe
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\explorer.exeJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: kernel32.dll0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: SetDllDirectory0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: "-k=0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: "/k=0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: -k=0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: /k=0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: Title0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: BeginPrompt0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: Progress0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: Directory0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: RunProgram0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: ExecuteFile0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: `A0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: setup.exe0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: %%T0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: %%T\0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: mia.lib0_2_0041FF60
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCommand line argument: runas0_2_0041FF60
            Source: cfrv_4_0_setup_ALL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1914366111.00000000056AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: INSERT INTO `Property` ( `Property` , `Value` ) VALUES ( 'PD77E7C08_1' , 'C:\Windows\SysWOW64\' )r;
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005089000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1799215868.0000000007140000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1799215868.00000000070E0000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000050ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: select * from CS_ErrorDescription'select * from sysdatabases where name='masterSQLSERVER_FATAL_ERROR1ValidateDB;Network Library=dbmssocnNetwork Library=dbmssocnd:\cs40\private\cs40\setup\ca_dll\database.cppCommitDB%s
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000068C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Selects the chart legend.W9Returns/sets the number of data columns in the data grid.WMReturns/sets the number of levels of labels on data columns in the data grid.WJReturns/sets the number of levels of labels on data rows in the data grid.6Returns/sets the number of data rows in the data grid.GDeletes columns of data and their associated labels from the data grid.WWW/Adds one or more data columns to the data grid.WWW>Deletes levels of labels from the data columns in a data grid.GAdds one or more levels of labels to the data columns in the data grid.WWWDDeletes rows of data and their associated labels from the data grid.WW,Adds one or more data rows to the data grid.WW;Deletes levels of labels from the data rows in a data grid.WWWDAdds one or more levels of labels to the data rows in the data grid.WW1Fills the data grid with randomly generated data.W4Sets the number and levels of data columns and rows.WWNAssigns each label in the first level of data grid labels a unique identifier.HFills one or more columns of the data grid with randomly generated data.WWEFills one or more rows of the data grid with randomly generated data.W(Moves a block of cells on the data grid.WW#Gets the value of a data grid cell.WWW#Sets the value of a data grid cell.WWW9Returns/sets the label on a data column in the data grid.WHReturns the multi-level label that identifies a column in the data grid.WWEReturns the multi-level label that identifies a row in the data grid.W6Returns/sets the label on a data row in the data grid.EReturns/sets the strength of the light coming from the light source.WCReturns/sets the X coordinate for the location of the LightSource.WWWCReturns/sets the Y coordinate for the location of the LightSource.WWWCReturns/sets the Z coordinate for the location of the LightSource.WWW]Sets the X,Y,Z coordinates for the LightSource location and the intensity of the LightSource.W
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.1914366111.00000000056AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: INSERT INTO `Property` ( `Property` , `Value` ) VALUES ( 'PEEBF1E87_1' , 'C:\Windows\SysWOW64\' )>;
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile read: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe "C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe"
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeProcess created: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe .\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k=""
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\mscomctl.ocx" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMDLG32.OCX" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMCT332.OCX" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\TABCTL32.OCX" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Program Files (x86)\Common Files\microsoft shared\DAO\DAO350.DLL" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_CR_control.dll" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_DB_Connect.dll" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Data.dll" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Export.dll" /s
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_Rmt_DB4_Update.dll" /s
            Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 69C5C113DED231894CD03AC8E1DE281B
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crviewer.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\Crystal\Cdo32.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crtslv.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\ExportModeller.dll"
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d}
            Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeProcess created: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe .\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k=""Jump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\mscomctl.ocx" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMDLG32.OCX" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMCT332.OCX" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\TABCTL32.OCX" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Program Files (x86)\Common Files\microsoft shared\DAO\DAO350.DLL" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_CR_control.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_DB_Connect.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Data.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Export.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_Rmt_DB4_Update.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d}Jump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 69C5C113DED231894CD03AC8E1DE281B
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crviewer.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\Crystal\Cdo32.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crtslv.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\ExportModeller.dll"
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: explorerframe.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: msimg32.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: mpr.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: winsta.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: olepro32.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: propsys.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: srclient.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: spp.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: msi.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: explorerframe.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: edputil.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: netutils.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: slc.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: userenv.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: sppc.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: srpapi.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: tsappcmp.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: sxs.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: twext.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: starttiledata.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: acppage.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: sfc.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: aepic.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeSection loaded: thumbcache.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sxs.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvbvm60.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sxs.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvcrt40.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvbvm60.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvbvm60.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvbvm60.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvbvm60.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvbvm60.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: version.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: linkinfo.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: ntshrui.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dll
            Source: C:\Windows\System32\msiexec.exeSection loaded: cscapi.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: craxdrt.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mfc42.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: olepro32.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msvcp60.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: craxdrt_res_zzz.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: craxdrt_res_zz.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: crviewer.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: olepro32.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msvcp60.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: crtslv.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: exportmodeller.dll
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: atl.dll
            Source: C:\Windows\explorer.exeSection loaded: aepic.dll
            Source: C:\Windows\explorer.exeSection loaded: twinapi.dll
            Source: C:\Windows\explorer.exeSection loaded: userenv.dll
            Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\explorer.exeSection loaded: ntmarta.dll
            Source: C:\Windows\explorer.exeSection loaded: cryptsp.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: dxgi.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\explorer.exeSection loaded: coremessaging.dll
            Source: C:\Windows\explorer.exeSection loaded: urlmon.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dll
            Source: C:\Windows\explorer.exeSection loaded: wininet.dll
            Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\explorer.exeSection loaded: sspicli.dll
            Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: wldp.dll
            Source: C:\Windows\explorer.exeSection loaded: iertutil.dll
            Source: C:\Windows\explorer.exeSection loaded: srvcli.dll
            Source: C:\Windows\explorer.exeSection loaded: netutils.dll
            Source: C:\Windows\explorer.exeSection loaded: umpdc.dll
            Source: C:\Windows\explorer.exeSection loaded: apphelp.dll
            Source: C:\Windows\explorer.exeSection loaded: dlnashext.dll
            Source: C:\Windows\explorer.exeSection loaded: wpdshext.dll
            Source: C:\Windows\explorer.exeSection loaded: ninput.dll
            Source: C:\Windows\explorer.exeSection loaded: dlnashext.dll
            Source: C:\Windows\explorer.exeSection loaded: wpdshext.dll
            Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\explorer.exeSection loaded: actxprxy.dll
            Source: C:\Windows\explorer.exeSection loaded: aepic.dll
            Source: C:\Windows\explorer.exeSection loaded: twinapi.dll
            Source: C:\Windows\explorer.exeSection loaded: userenv.dll
            Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\explorer.exeSection loaded: ntmarta.dll
            Source: C:\Windows\explorer.exeSection loaded: cryptsp.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: dxgi.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\explorer.exeSection loaded: coremessaging.dll
            Source: C:\Windows\explorer.exeSection loaded: urlmon.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
            Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dll
            Source: C:\Windows\explorer.exeSection loaded: wininet.dll
            Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\explorer.exeSection loaded: sspicli.dll
            Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dll
            Source: C:\Windows\explorer.exeSection loaded: wldp.dll
            Source: C:\Windows\explorer.exeSection loaded: iertutil.dll
            Source: C:\Windows\explorer.exeSection loaded: srvcli.dll
            Source: C:\Windows\explorer.exeSection loaded: netutils.dll
            Source: C:\Windows\explorer.exeSection loaded: umpdc.dll
            Source: C:\Windows\explorer.exeSection loaded: ninput.dll
            Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\explorer.exeSection loaded: actxprxy.dll
            Source: C:\Windows\explorer.exeSection loaded: sxs.dll
            Source: C:\Windows\explorer.exeSection loaded: textinputframework.dll
            Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dll
            Source: C:\Windows\explorer.exeSection loaded: wintypes.dll
            Source: C:\Windows\explorer.exeSection loaded: wintypes.dll
            Source: C:\Windows\explorer.exeSection loaded: wintypes.dll
            Source: C:\Windows\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dll
            Source: C:\Windows\explorer.exeSection loaded: profapi.dll
            Source: C:\Windows\explorer.exeSection loaded: thumbcache.dll
            Source: C:\Windows\explorer.exeSection loaded: policymanager.dll
            Source: C:\Windows\explorer.exeSection loaded: msvcp110_win.dll
            Source: C:\Windows\explorer.exeSection loaded: dataexchange.dll
            Source: C:\Windows\explorer.exeSection loaded: d3d11.dll
            Source: C:\Windows\explorer.exeSection loaded: dcomp.dll
            Source: C:\Windows\explorer.exeSection loaded: textshaping.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.ui.fileexplorer.dll
            Source: C:\Windows\explorer.exeSection loaded: oleacc.dll
            Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
            Source: C:\Windows\explorer.exeSection loaded: atlthunk.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryclient.dll
            Source: C:\Windows\explorer.exeSection loaded: apphelp.dll
            Source: C:\Windows\explorer.exeSection loaded: devicecenter.dll
            Source: C:\Windows\explorer.exeSection loaded: wsock32.dll
            Source: C:\Windows\explorer.exeSection loaded: msimg32.dll
            Source: C:\Windows\explorer.exeSection loaded: linkinfo.dll
            Source: C:\Windows\explorer.exeSection loaded: appresolver.dll
            Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dll
            Source: C:\Windows\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\explorer.exeSection loaded: sppc.dll
            Source: C:\Windows\explorer.exeSection loaded: twext.dll
            Source: C:\Windows\explorer.exeSection loaded: cscui.dll
            Source: C:\Windows\explorer.exeSection loaded: cscobj.dll
            Source: C:\Windows\explorer.exeSection loaded: cscapi.dll
            Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dll
            Source: C:\Windows\explorer.exeSection loaded: ntshrui.dll
            Source: C:\Windows\explorer.exeSection loaded: version.dll
            Source: C:\Windows\explorer.exeSection loaded: msasn1.dll
            Source: C:\Windows\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\explorer.exeSection loaded: cryptbase.dll
            Source: C:\Windows\explorer.exeSection loaded: starttiledata.dll
            Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dll
            Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.dll
            Source: C:\Windows\explorer.exeSection loaded: appextension.dll
            Source: C:\Windows\explorer.exeSection loaded: appxdeploymentclient.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: acppage.dll
            Source: C:\Windows\explorer.exeSection loaded: sfc.dll
            Source: C:\Windows\explorer.exeSection loaded: msi.dll
            Source: C:\Windows\explorer.exeSection loaded: sfc_os.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: windows.fileexplorer.common.dll
            Source: C:\Windows\explorer.exeSection loaded: edputil.dll
            Source: C:\Windows\explorer.exeSection loaded: mpr.dll
            Source: C:\Windows\explorer.exeSection loaded: drprov.dll
            Source: C:\Windows\explorer.exeSection loaded: winsta.dll
            Source: C:\Windows\explorer.exeSection loaded: ntlanman.dll
            Source: C:\Windows\explorer.exeSection loaded: davclnt.dll
            Source: C:\Windows\explorer.exeSection loaded: davhlpr.dll
            Source: C:\Windows\explorer.exeSection loaded: wkscli.dll
            Source: C:\Windows\explorer.exeSection loaded: dlnashext.dll
            Source: C:\Windows\explorer.exeSection loaded: playtodevice.dll
            Source: C:\Windows\explorer.exeSection loaded: devdispitemprovider.dll
            Source: C:\Windows\explorer.exeSection loaded: mmdevapi.dll
            Source: C:\Windows\explorer.exeSection loaded: devobj.dll
            Source: C:\Windows\explorer.exeSection loaded: wpdshext.dll
            Source: C:\Windows\explorer.exeSection loaded: portabledeviceapi.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorapi.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Windows\explorer.exeSection loaded: mydocs.dll
            Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
            Source: C:\Windows\explorer.exeSection loaded: zipfldr.dll
            Source: C:\Windows\explorer.exeSection loaded: sendmail.dll
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\regsvr32.exeKey value created or modified: HKEY_CURRENT_USER\Control Panel\Mouse MouseHoverTimeJump to behavior
            Source: cfrv_4_0_setup_ALL.exeStatic file information: File size 14277760 > 1048576
            Source: Binary string: MsiHnd.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: MsiHnd.pdbV source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: shfolder.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rF,c:\Windows\System32\ImgXTwain61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: shfolder.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: GameuxInstallHelper.pdb source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: gacutil.pdb source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: c:\Windows\System32\ImgX61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: gacutil.pdb(0 source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: sdbapiu.pdbU source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: usp10.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: c:\Windows\System32\ImgXPrint61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msisip.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp, msisip.dll.0.dr
            Source: Binary string: rFXc:\Windows\System32\ImgX61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: sdbapiu.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: riched20.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mspatcha.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Y:\EPFXlate\HTML\ReleaseSym\exlate32.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msi.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000057C3000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: c:\Windows\System32\ImgXTwain61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rFWc:\Windows\System32\ImgX61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: gacutil.pdb, AH/@ source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: sdbapi.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msi_l.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: usp10.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: imagehlp.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msi.pdbh source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000057C3000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mspatcha.pdbtvbl01\LOCALS~1\Temp\2\DBGtoPDB\mspatcha.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: imagehlp.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: riched20.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Y:\EPFXlate\HTML\ReleaseSym\exlate32.pdbMZ source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005179000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: sdbapi.pdbU source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000062AE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: tvbl01\LOCALS~1\Temp\2\DBGtoPDB\mspatcha.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005BE2000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rF,c:\Windows\System32\ImgXPrint61.pdb source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: msisip.pdb3 source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005981000.00000004.00000020.00020000.00000000.sdmp, msisip.dll.0.dr
            Source: Binary string: gacutlrc.pdb source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1802151713.0000000000842000.00000002.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFCA4000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0041F0E0 GetSystemDefaultUILanguage,GetSystemDefaultUILanguage,LoadLibraryW,GetProcAddress,FreeLibrary,_malloc,__CxxThrowException@8,LoadLibraryW,GetProcAddress,FreeLibrary,_swscanf,GetSystemDefaultUILanguage,SetThreadUILanguage,GetUserDefaultUILanguage,SetThreadUILanguage,SetThreadLocale,0_2_0041F0E0
            Source: stdole2.tlb.0.drStatic PE information: real checksum: 0x0 should be: 0x52af
            Source: sscsdk80.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x128651
            Source: Crpe32.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x4d2dd3
            Source: CRxmlx07r.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x1dd3a
            Source: u2lcom.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x29105
            Source: exlate32.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xaffcb
            Source: u2fsepv.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x19f64
            Source: u2ddisk.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x103c1
            Source: Crpaig80.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x9e40f
            Source: u2dnotes.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x149ee
            Source: crxf_rtf.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x32017
            Source: AtalaImaging.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x136494
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x56e113
            Source: CRxmlx07.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xea5a8
            Source: u2fxls.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x41a2a
            Source: ExportModeller.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x4ae62
            Source: Implode.dll.0.drStatic PE information: real checksum: 0xb8c2 should be: 0x104a3
            Source: craxdrt.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x4f77f9
            Source: u2dmapi.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xdf55
            Source: u2fhtml.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x10ea0
            Source: cfrv_4_0_setup_ALL.exe.0.drStatic PE information: section name: .didata
            Source: usp10.dll.0.drStatic PE information: section name: Shared
            Source: usp10.dll0.0.drStatic PE information: section name: Shared
            Source: craxdrt.dll.0.drStatic PE information: section name: _CODE
            Source: Crpe32.dll.0.drStatic PE information: section name: _CODE
            Source: exlate32.dll.0.drStatic PE information: section name: _CODE
            Source: mDownExec.dll.0.drStatic PE information: section name: .didata
            Source: mMSIExec.dll.0.drStatic PE information: section name: .didata
            Source: msi.dll.0.drStatic PE information: section name: .orpc
            Source: msi.dll0.0.drStatic PE information: section name: .orpc
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Program Files (x86)\Common Files\microsoft shared\DAO\DAO350.DLL" /s
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00434168 pushad ; iretd 0_2_00434169
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00423ADD push ecx; ret 0_2_00423AF0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00437F08 push ecx; retf 0_2_00437F09
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10013130 push ecx; mov dword ptr [esp], ecx1_2_10013131
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1001D2C0 push eax; ret 1_2_1001D2EE
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10018EB0 push eax; ret 1_2_10018ECE
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C827AE9 push ecx; ret 1_2_6C827AFC
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D25B4F4E\7204BF44\CRBAS15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\olepro32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\riched20.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\F7CFC206\7204BF44\Implode.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lexch.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lsamp1.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DC878553\34510A4\AtalaImaging.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\sdbapiU.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FCE647BF\1835CB68\u2ldts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\701CB7F7\34510A4\mscomctl.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\51868479\1517B7F7\CF_report_main_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BB709D56\1517B7F7\CF_Trans_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9709.tmpJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\pPin32.cplJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C8E76B1B\1835CB68\u2lexch.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\EABD308B\1835CB68\u2dnotes.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9748.tmpJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496C80D6\34510A4\MSCHRT20.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\cabinet.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\p2ixbse.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lfinra.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B3FFCC7F\1835CB68\u2dmapi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\90E4D581\1517B7F7\CF_ref_report_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msisip.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C7D8D83E\34510A4\SSubTmr6.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mWinRun.dll\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\5A4D542C\7204BF44\CRUTL15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A297C06E\1517B7F7\CF_audit_review_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiexec.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D4B1A979\1835CB68\u2l2000.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1D5631E8\1517B7F7\CF_Login.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\9F0CE7B6\7204BF44\CRxmlx07.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D63D429\1517B7F7\CF_document_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9788.tmpJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF16.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fxml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msimsg.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\Crxlat32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\ADVPACK.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\mspatcha.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1A28DE63\34510A4\dao360.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BA3E37E4\1517B7F7\CF_CR_control.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msls31.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DCDC5FB4\1517B7F7\CF_File_Import.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\880D11DF\1835CB68\P2smon.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15R.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dapp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\usp10.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\EEBF1E87\7204BF44\exlate32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Crpaig80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DF17326D\1835CB68\Crxlat32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRxmlx07.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BED664EA\7204BF44\Crpaig80.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\pPin64.cplJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRBAS15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E5B6414\1835CB68\u2fcr.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crwrap32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FAAEA181\7204BF44\ExportModeller.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\474E307D\1835CB68\u2lsamp1.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Implode.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7CC1D691\34510A4\TABCTL32.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mDown.dll\mDownExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\riched20.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6C6652B9\1517B7F7\CF_report_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\usp10.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\8BAE8D59\7204BF44\p2sodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msihnd.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E76BBEDE\7204BF44\crviewer.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u252000.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6D4D0E7\34510A4\ImgX61.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\p2sodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A8299B92\7204BF44\CRXML15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B70202BD\7C02DA3A\CF_Remote.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3D003E72\1835CB68\u2fxml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\33BB160B\1835CB68\u2dapp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\416B4F42\1517B7F7\CF_org_history_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E04462E5\1517B7F7\CF_Report_Verify_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A52CA551\7204BF44\CRXML15S.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF32.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\crxf_pdf.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRUTL15R.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dvim.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2ddisk.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1DF81C7A\34510A4\ImgXPrint61.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2D3E0D90\7204BF44\Crpe32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRxmlx07r.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\comcat.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\msvbvm60.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B2966187\1517B7F7\CF_File_Data.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\imagehlp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A9695CDF\1517B7F7\CF_Rmt_DB4_Update.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dpost.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FE57A718\1517B7F7\CF_DB_Connect.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2l2000.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\asycfilt.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\ExportModeller.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\imagehlp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\83C5D67\7204BF44\crtslv.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI961D.tmpJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\526A560A\1835CB68\u2lcom.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fxls.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\oleaut32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\sdbapi.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2ldts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C2C59FBE\1517B7F7\CF_File_Export.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiinst.exeJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Crpe32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\craxdrt.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2ADC2324\1835CB68\u25dts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\AB3A15F4\34510A4\TABCTL32.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\63200452\1835CB68\u2dpost.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crviewer.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiexec.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msimsg.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\47C10F79\7204BF44\CRxmlx07r.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRBAS15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1BF788A5\1517B7F7\CF_Name_bus.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\92CEEA92\34510A4\DAO350.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\pg32conv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\43981525\7204BF44\pg32conv.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\sscsdk80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6DEA5FF3\7204BF44\CRXML15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiinst.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\679B857\34510A4\COMDLG32.OCXJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dmapi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\stdole2.tlbJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\exlate32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1F62DE62\1517B7F7\CF_File_Import_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2EC6F5ED\34510A4\vbalColumnTreeView6.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\mspatcha.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496179\1517B7F7\CF_rs_browse_bus.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mDownExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\161F85F0\7204BF44\CRUTL15.DLLJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Windows\System32\myah0.cplJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7DB1D6B0\7204BF44\CRBAS15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\mia.libJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3E323407\1835CB68\u2fxls.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\cabinet.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A157FA05\1835CB68\crxf_rtf.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C964AC44\1835CB68\u2lfinra.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msisip.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fsepv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\ED7284FA\1517B7F7\CF_report_export_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DAE69E8\7204BF44\craxdrt.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A95AB0B4\34510A4\ImgX61.ocxJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\p2lodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msihnd.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E81A74\34510A4\vbalColumnTreeView6.ocaJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\487DDF\1835CB68\u2ddisk.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\mia.libJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRUTL15.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\crxf_rtf.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DD3D7189\34510A4\COMCT332.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4B371E22\34510A4\vbalFlBr6.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lcom.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\83ED17B7\1517B7F7\CF_report_history_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\P2smon.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msls31.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\IIIQF\7z.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7A300D31\1835CB68\crxf_pdf.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dnotes.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3B44007A\1835CB68\u252000.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\832FC268\1517B7F7\LogFile.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u25dts.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\Cdo32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\68965F3A\1835CB68\u2fhtml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D71275EF\1517B7F7\CF_org_bus.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mMSIExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\CBB1E6D9\1517B7F7\CF_Transaction.ocxJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4D29780E\1835CB68\u2fsepv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E3BD0475\1517B7F7\LogFile.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E2BBEE13\1835CB68\p2ixbse.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crtslv.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C847D812\1835CB68\Cdo32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\80B1517D\1835CB68\u2dvim.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FBA4A636\1835CB68\p2lodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\CE1E931F\7204BF44\sscsdk80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\shfolder.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D77E7C08\7204BF44\crwrap32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fhtml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\184596D6\1517B7F7\CF_login_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fcr.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\F0E0F85C\1517B7F7\cf_rpt_link_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\205EBC50\34510A4\ImgXTwain61.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15S.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\shfolder.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\cfrv_4_0_setup_ALL.exeJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\SBoE\Campaign Finance\CF Remote\CF_Remote.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D25B4F4E\7204BF44\CRBAS15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2ADC2324\1835CB68\u25dts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\olepro32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\riched20.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\F7CFC206\7204BF44\Implode.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\AB3A15F4\34510A4\TABCTL32.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\63200452\1835CB68\u2dpost.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiexec.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msimsg.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DC878553\34510A4\AtalaImaging.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\sdbapiU.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\47C10F79\7204BF44\CRxmlx07r.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FCE647BF\1835CB68\u2ldts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\701CB7F7\34510A4\mscomctl.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\51868479\1517B7F7\CF_report_main_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BB709D56\1517B7F7\CF_Trans_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C8E76B1B\1835CB68\u2lexch.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\EABD308B\1835CB68\u2dnotes.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496C80D6\34510A4\MSCHRT20.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\cabinet.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1BF788A5\1517B7F7\CF_Name_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B3FFCC7F\1835CB68\u2dmapi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\90E4D581\1517B7F7\CF_ref_report_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msisip.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C7D8D83E\34510A4\SSubTmr6.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mWinRun.dll\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\92CEEA92\34510A4\DAO350.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\5A4D542C\7204BF44\CRUTL15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\43981525\7204BF44\pg32conv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A297C06E\1517B7F7\CF_audit_review_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6DEA5FF3\7204BF44\CRXML15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiinst.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiexec.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\679B857\34510A4\COMDLG32.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D4B1A979\1835CB68\u2l2000.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1D5631E8\1517B7F7\CF_Login.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\9F0CE7B6\7204BF44\CRxmlx07.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D63D429\1517B7F7\CF_document_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\stdole2.tlbJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1F62DE62\1517B7F7\CF_File_Import_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF16.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2EC6F5ED\34510A4\vbalColumnTreeView6.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\mspatcha.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496179\1517B7F7\CF_rs_browse_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\161F85F0\7204BF44\CRUTL15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msimsg.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\ADVPACK.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\mspatcha.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1A28DE63\34510A4\dao360.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7DB1D6B0\7204BF44\CRBAS15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\mia.libJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BA3E37E4\1517B7F7\CF_CR_control.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msls31.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DCDC5FB4\1517B7F7\CF_File_Import.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3E323407\1835CB68\u2fxls.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\880D11DF\1835CB68\P2smon.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\cabinet.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\usp10.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\EEBF1E87\7204BF44\exlate32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A157FA05\1835CB68\crxf_rtf.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C964AC44\1835CB68\u2lfinra.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DF17326D\1835CB68\Crxlat32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msisip.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\ED7284FA\1517B7F7\CF_report_export_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DAE69E8\7204BF44\craxdrt.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A95AB0B4\34510A4\ImgX61.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msihnd.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BED664EA\7204BF44\Crpaig80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E5B6414\1835CB68\u2fcr.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\487DDF\1835CB68\u2ddisk.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E81A74\34510A4\vbalColumnTreeView6.ocaJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FAAEA181\7204BF44\ExportModeller.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\474E307D\1835CB68\u2lsamp1.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7CC1D691\34510A4\TABCTL32.OCXJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\mia.libJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mDown.dll\mDownExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\riched20.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DD3D7189\34510A4\COMCT332.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4B371E22\34510A4\vbalFlBr6.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\83ED17B7\1517B7F7\CF_report_history_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6C6652B9\1517B7F7\CF_report_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\usp10.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msls31.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\8BAE8D59\7204BF44\p2sodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msihnd.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E76BBEDE\7204BF44\crviewer.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7A300D31\1835CB68\crxf_pdf.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3B44007A\1835CB68\u252000.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\832FC268\1517B7F7\LogFile.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6D4D0E7\34510A4\ImgX61.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A8299B92\7204BF44\CRXML15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B70202BD\7C02DA3A\CF_Remote.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3D003E72\1835CB68\u2fxml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\33BB160B\1835CB68\u2dapp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\68965F3A\1835CB68\u2fhtml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\416B4F42\1517B7F7\CF_org_history_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E04462E5\1517B7F7\CF_Report_Verify_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF32.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D71275EF\1517B7F7\CF_org_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A52CA551\7204BF44\CRXML15S.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\CBB1E6D9\1517B7F7\CF_Transaction.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4D29780E\1835CB68\u2fsepv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1DF81C7A\34510A4\ImgXPrint61.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2D3E0D90\7204BF44\Crpe32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\comcat.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\msvbvm60.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E3BD0475\1517B7F7\LogFile.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E2BBEE13\1835CB68\p2ixbse.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C847D812\1835CB68\Cdo32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B2966187\1517B7F7\CF_File_Data.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\imagehlp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\80B1517D\1835CB68\u2dvim.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FBA4A636\1835CB68\p2lodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A9695CDF\1517B7F7\CF_Rmt_DB4_Update.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\CE1E931F\7204BF44\sscsdk80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\shfolder.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D77E7C08\7204BF44\crwrap32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FE57A718\1517B7F7\CF_DB_Connect.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\asycfilt.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\imagehlp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\83C5D67\7204BF44\crtslv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\184596D6\1517B7F7\CF_login_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\F0E0F85C\1517B7F7\cf_rpt_link_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\526A560A\1835CB68\u2lcom.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\205EBC50\34510A4\ImgXTwain61.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\shfolder.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\cfrv_4_0_setup_ALL.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\oleaut32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\sdbapi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C2C59FBE\1517B7F7\CF_File_Export.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiinst.exeJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crwrap32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Implode.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lexch.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crviewer.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lsamp1.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRUTL15.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\crxf_rtf.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lcom.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9709.tmpJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\P2smon.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9748.tmpJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\p2ixbse.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRBAS15.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dnotes.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u252000.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2lfinra.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\p2sodbc.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u25dts.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\Cdo32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\pg32conv.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\sscsdk80.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dmapi.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\crxf_pdf.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRUTL15R.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9788.tmpJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dvim.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\exlate32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fxml.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2ddisk.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Windows\System32\myah0.cplJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRxmlx07r.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\Crxlat32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\crtslv.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dpost.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15R.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2l2000.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\ExportModeller.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2dapp.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI961D.tmpJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fhtml.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Crpaig80.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fcr.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fxls.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRXML15S.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2fsepv.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\u2ldts.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Crystal\p2lodbc.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRxmlx07.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\Crpe32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\CRBAS15R.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\craxdrt.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\mia.libJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E81A74\34510A4\vbalColumnTreeView6.ocaJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\pPin64.cplJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Windows\System32\myah0.cplJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\mia.libJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\pPin32.cplJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile created: c:\tmp\log\installs\CF_Remote\install.logJump to behavior
            Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Campaign Finance
            Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Campaign Finance\CF Remote.lnk

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: torConnect
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D25B4F4E\7204BF44\CRBAS15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2ADC2324\1835CB68\u25dts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\riched20.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\F7CFC206\7204BF44\Implode.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\63200452\1835CB68\u2dpost.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2lexch.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2lsamp1.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiexec.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msimsg.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DC878553\34510A4\AtalaImaging.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\sdbapiU.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\47C10F79\7204BF44\CRxmlx07r.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FCE647BF\1835CB68\u2ldts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\51868479\1517B7F7\CF_report_main_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BB709D56\1517B7F7\CF_Trans_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI9709.tmpJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\pPin32.cplJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C8E76B1B\1835CB68\u2lexch.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\EABD308B\1835CB68\u2dnotes.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI9748.tmpJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496C80D6\34510A4\MSCHRT20.OCXJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\cabinet.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\p2ixbse.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRBAS15.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2lfinra.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1BF788A5\1517B7F7\CF_Name_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\90E4D581\1517B7F7\CF_ref_report_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B3FFCC7F\1835CB68\u2dmapi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msisip.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C7D8D83E\34510A4\SSubTmr6.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mWinRun.dll\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\92CEEA92\34510A4\DAO350.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\5A4D542C\7204BF44\CRUTL15R.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\pg32conv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\43981525\7204BF44\pg32conv.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\sscsdk80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6DEA5FF3\7204BF44\CRXML15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A297C06E\1517B7F7\CF_audit_review_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiinst.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiexec.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D4B1A979\1835CB68\u2l2000.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2dmapi.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1D5631E8\1517B7F7\CF_Login.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\9F0CE7B6\7204BF44\CRxmlx07.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D63D429\1517B7F7\CF_document_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI9788.tmpJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\stdole2.tlbJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\exlate32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1F62DE62\1517B7F7\CF_File_Import_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF16.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2EC6F5ED\34510A4\vbalColumnTreeView6.ocxJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\mspatcha.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496179\1517B7F7\CF_rs_browse_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2fxml.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mDownExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\161F85F0\7204BF44\CRUTL15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msimsg.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\Crxlat32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\ADVPACK.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\mspatcha.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1A28DE63\34510A4\dao360.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7DB1D6B0\7204BF44\CRBAS15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BA3E37E4\1517B7F7\CF_CR_control.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msls31.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DCDC5FB4\1517B7F7\CF_File_Import.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3E323407\1835CB68\u2fxls.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\880D11DF\1835CB68\P2smon.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRXML15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\cabinet.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2dapp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\usp10.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\EEBF1E87\7204BF44\exlate32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\Crpaig80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A157FA05\1835CB68\crxf_rtf.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C964AC44\1835CB68\u2lfinra.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\DF17326D\1835CB68\Crxlat32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msisip.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2fsepv.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\ED7284FA\1517B7F7\CF_report_export_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A95AB0B4\34510A4\ImgX61.ocxJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRxmlx07.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\p2lodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msihnd.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\pPin64.cplJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRBAS15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\BED664EA\7204BF44\Crpaig80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E5B6414\1835CB68\u2fcr.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E81A74\34510A4\vbalColumnTreeView6.ocaJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\crwrap32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\487DDF\1835CB68\u2ddisk.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\474E307D\1835CB68\u2lsamp1.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\Implode.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRUTL15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mDown.dll\mDownExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\riched20.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\crxf_rtf.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2lcom.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4B371E22\34510A4\vbalFlBr6.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\83ED17B7\1517B7F7\CF_report_history_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6C6652B9\1517B7F7\CF_report_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\P2smon.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\usp10.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msls31.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\IIIQF\7z.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\8BAE8D59\7204BF44\p2sodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msihnd.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7A300D31\1835CB68\crxf_pdf.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2dnotes.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\832FC268\1517B7F7\LogFile.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3B44007A\1835CB68\u252000.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u252000.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\p2sodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6D4D0E7\34510A4\ImgX61.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A8299B92\7204BF44\CRXML15R.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B70202BD\7C02DA3A\CF_Remote.exeJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u25dts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3D003E72\1835CB68\u2fxml.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\Cdo32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\33BB160B\1835CB68\u2dapp.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\68965F3A\1835CB68\u2fhtml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\416B4F42\1517B7F7\CF_org_history_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E04462E5\1517B7F7\CF_Report_Verify_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF32.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A52CA551\7204BF44\CRXML15S.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D71275EF\1517B7F7\CF_org_bus.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mMSIExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\CBB1E6D9\1517B7F7\CF_Transaction.ocxJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\crxf_pdf.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRUTL15R.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2dvim.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRXML15.DLLJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4D29780E\1835CB68\u2fsepv.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2ddisk.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1DF81C7A\34510A4\ImgXPrint61.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2D3E0D90\7204BF44\Crpe32.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRxmlx07r.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\mWinRunExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\comcat.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E3BD0475\1517B7F7\LogFile.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\E2BBEE13\1835CB68\p2ixbse.dllJump to dropped file
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mVBExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C847D812\1835CB68\Cdo32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\B2966187\1517B7F7\CF_File_Data.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FBA4A636\1835CB68\p2lodbc.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\80B1517D\1835CB68\u2dvim.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2dpost.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\A9695CDF\1517B7F7\CF_Rmt_DB4_Update.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\CE1E931F\7204BF44\sscsdk80.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\D77E7C08\7204BF44\crwrap32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\shfolder.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\FE57A718\1517B7F7\CF_DB_Connect.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2l2000.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\asycfilt.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI961D.tmpJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2fhtml.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\184596D6\1517B7F7\CF_login_bus.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2fcr.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\F0E0F85C\1517B7F7\cf_rpt_link_bus.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\526A560A\1835CB68\u2lcom.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\205EBC50\34510A4\ImgXTwain61.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\CRXML15S.DLLJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2fxls.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\shfolder.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\SBoE\Campaign Finance\CF Remote\CF_Remote.exeJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\sdbapi.dllJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Crystal\u2ldts.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\OFFLINE\C2C59FBE\1517B7F7\CF_File_Export.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeDropped PE file which has not been started: C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiinst.exeJump to dropped file
            Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\Crpe32.dllJump to dropped file
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-20218
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-20121
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeAPI coverage: 8.2 %
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00407E20 FindNextFileW,FindClose,FindFirstFileW,FindFirstFileW,0_2_00407E20
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C822A30 _memset,FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,1_2_6C822A30
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C812470 FindClose,FindFirstFileW,FindFirstFileW,1_2_6C812470
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_10001B41 GetSystemInfo,1_2_10001B41
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start MenuJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start Menu\ProgramsJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\MicrosoftJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Campaign Finance\CF Remote.lnkJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Campaign FinanceJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeFile opened: C:\ProgramData\Microsoft\WindowsJump to behavior
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ZuneVi8
            Source: explorer.exe, 00000018.00000002.2963750592.0000000009426000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}&
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}$
            Source: explorer.exe, 00000017.00000003.2036803184.00000000010C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#4&224f42ef
            Source: explorer.exe, 00000017.00000003.2036803184.00000000010C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: en_NECVMWar&Prod_VMware_SATA_CD00#4&h
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002805000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: NC:\Windows\system32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}75-4CF
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}_8weky
            Source: explorer.exe, 00000018.00000003.2101524178.00000000067EF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000018.00000002.2963338715.00000000067EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWES
            Source: explorer.exe, 00000018.00000002.2963959028.0000000009555000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ftEdge;
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeAPI call chain: ExitProcess graph end nodegraph_1-37750
            Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00424C1E _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00424C1E
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0041F0E0 GetSystemDefaultUILanguage,GetSystemDefaultUILanguage,LoadLibraryW,GetProcAddress,FreeLibrary,_malloc,__CxxThrowException@8,LoadLibraryW,GetProcAddress,FreeLibrary,_swscanf,GetSystemDefaultUILanguage,SetThreadUILanguage,GetUserDefaultUILanguage,SetThreadUILanguage,SetThreadLocale,0_2_0041F0E0
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004251D4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004251D4
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00424C1E _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00424C1E
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00426C2A SetUnhandledExceptionFilter,0_2_00426C2A
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_00421DDF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421DDF
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1001B723 SetUnhandledExceptionFilter,1_2_1001B723
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_1001B735 SetUnhandledExceptionFilter,1_2_1001B735
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C826CD8 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_6C826CD8
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C825A8A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_6C825A8A
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: 1_2_6C8251C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_6C8251C7
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0041FF60 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,MessageBoxW,CoInitialize,_memset,GetVersionExW,GetCommandLineW,_malloc,__CxxThrowException@8,MessageBoxW,_malloc,__CxxThrowException@8,MessageBoxW,MessageBoxW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,ShellExecuteExW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateProcessW,GetLastError,GetLastError,CoInitializeEx,ShellExecuteExW,GetLastError,SetCurrentDirectoryW,SetCurrentDirectoryW,CloseHandle,WaitForSingleObject,GetExitCodeProcess,CloseHandle,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_0041FF60
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\mscomctl.ocx" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMDLG32.OCX" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMCT332.OCX" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\TABCTL32.OCX" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Program Files (x86)\Common Files\microsoft shared\DAO\DAO350.DLL" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_CR_control.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_DB_Connect.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Data.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Export.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_Rmt_DB4_Update.dll" /sJump to behavior
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d}Jump to behavior
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crviewer.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\Crystal\Cdo32.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crtslv.dll"
            Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\ExportModeller.dll"
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.0000000000418000.00000020.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Progmanadvapi32.dllCreateProcessWithTokenW
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.0000000000418000.00000020.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ProgmanU
            Source: cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.0000000000418000.00000020.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndU
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: GetLocaleInfoA,0_2_0042C5C6
            Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exeCode function: GetLocaleInfoA,1_2_6C82DEDB
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_004273A1 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004273A1
            Source: C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exeCode function: 0_2_0041F320 GetVersion,CoCreateInstance,0_2_0041F320
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Replication Through Removable Media
            2
            Command and Scripting Interpreter
            1
            Registry Run Keys / Startup Folder
            1
            Exploitation for Privilege Escalation
            32
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Native API
            1
            DLL Side-Loading
            12
            Process Injection
            12
            Process Injection
            LSASS Memory11
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Multi-hop Proxy
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Registry Run Keys / Startup Folder
            1
            Deobfuscate/Decode Files or Information
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Proxy
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            2
            Obfuscated Files or Information
            NTDS11
            Peripheral Device Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Regsvr32
            LSA Secrets2
            System Owner/User Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials3
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            File Deletion
            DCSync35
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1542302 Sample: cfrv_4_0_setup_ALL.exe Startdate: 25/10/2024 Architecture: WINDOWS Score: 48 58 Sigma detected: Files With System Process Name In Unsuspected Locations 2->58 7 cfrv_4_0_setup_ALL.exe 1 702 2->7         started        11 msiexec.exe 2->11         started        13 explorer.exe 2->13         started        process3 file4 34 C:\ProgramData\mia3DCC.tmp\mia.lib, PE32 7->34 dropped 36 C:\ProgramData\...\mWinRunExec.dll, PE32 7->36 dropped 38 C:\ProgramData\mia3DCC.tmp\...\mVBExec.dll, PE32 7->38 dropped 46 133 other files (none is malicious) 7->46 dropped 60 May use the Tor software to hide its network traffic 7->60 15 cfrv_4_0_setup_ALL.exe 24 91 7->15         started        40 C:\Windows\SysWOW64\sscsdk80.dll, PE32 11->40 dropped 42 C:\Windows\SysWOW64\pg32conv.dll, PE32 11->42 dropped 44 C:\Windows\SysWOW64\p2sodbc.dll, PE32 11->44 dropped 48 49 other files (none is malicious) 11->48 dropped 18 msiexec.exe 11->18         started        20 msiexec.exe 11->20         started        22 msiexec.exe 11->22         started        24 3 other processes 11->24 signatures5 process6 file7 50 C:\Windows\System32\myah0.cpl, PE32+ 15->50 dropped 52 C:\Users\user\AppData\Local\...\pPin64.cpl, PE32+ 15->52 dropped 54 C:\Users\user\AppData\Local\...\pPin32.cpl, PE32 15->54 dropped 56 7 other files (none is malicious) 15->56 dropped 26 regsvr32.exe 270 15->26         started        28 regsvr32.exe 15->28         started        30 regsvr32.exe 15->30         started        32 8 other processes 15->32 process8

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            cfrv_4_0_setup_ALL.exe0%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\SBoE\Campaign Finance\CF Remote\CF_Remote.exe0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\ADVPACK.DLL0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF16.DLL0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\W95INF32.DLL0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\asycfilt.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\comcat.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\mVBExec.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\msvbvm60.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\oleaut32.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\olepro32.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Visual Basic Virtual Machine 6.0 with Service Pack 6\mVB.dll\stdole2.tlb0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\cabinet.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\imagehlp.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msi.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiexec.exe0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msihnd.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msiinst.exe0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msimsg.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msisip.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\msls31.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\mspatcha.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\riched20.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\sdbapi.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\shfolder.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\ansi\usp10.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\mWinRunExec.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\cabinet.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\imagehlp.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msi.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiexec.exe0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msihnd.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msiinst.exe0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msimsg.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msisip.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\msls31.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\mspatcha.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\riched20.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\sdbapiU.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\shfolder.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\Microsoft Windows Installer 2.0\mWinRun.dll\unicode\usp10.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\161F85F0\7204BF44\CRUTL15.DLL0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\184596D6\1517B7F7\CF_login_bus.dll2%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1A28DE63\34510A4\dao360.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1BF788A5\1517B7F7\CF_Name_bus.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1D5631E8\1517B7F7\CF_Login.ocx0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1DF81C7A\34510A4\ImgXPrint61.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\1F62DE62\1517B7F7\CF_File_Import_bus.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\205EBC50\34510A4\ImgXTwain61.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2ADC2324\1835CB68\u25dts.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2D3E0D90\7204BF44\Crpe32.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E5B6414\1835CB68\u2fcr.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2E81A74\34510A4\vbalColumnTreeView6.oca0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\2EC6F5ED\34510A4\vbalColumnTreeView6.ocx0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\33BB160B\1835CB68\u2dapp.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3B44007A\1835CB68\u252000.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3D003E72\1835CB68\u2fxml.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\3E323407\1835CB68\u2fxls.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\416B4F42\1517B7F7\CF_org_history_bus.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\43981525\7204BF44\pg32conv.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\474E307D\1835CB68\u2lsamp1.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\47C10F79\7204BF44\CRxmlx07r.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\487DDF\1835CB68\u2ddisk.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496179\1517B7F7\CF_rs_browse_bus.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\496C80D6\34510A4\MSCHRT20.OCX0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4B371E22\34510A4\vbalFlBr6.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\4D29780E\1835CB68\u2fsepv.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\51868479\1517B7F7\CF_report_main_bus.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\526A560A\1835CB68\u2lcom.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\5A4D542C\7204BF44\CRUTL15R.DLL0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\63200452\1835CB68\u2dpost.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\679B857\34510A4\COMDLG32.OCX0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\68965F3A\1835CB68\u2fhtml.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6C6652B9\1517B7F7\CF_report_bus.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6D4D0E7\34510A4\ImgX61.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\6DEA5FF3\7204BF44\CRXML15.DLL0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\701CB7F7\34510A4\mscomctl.ocx0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7A300D31\1835CB68\crxf_pdf.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7CC1D691\34510A4\TABCTL32.OCX0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\7DB1D6B0\7204BF44\CRBAS15R.DLL0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\80B1517D\1835CB68\u2dvim.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\832FC268\1517B7F7\LogFile.dll0%ReversingLabs
            C:\ProgramData\mia3DCC.tmp\data\OFFLINE\83C5D67\7204BF44\crtslv.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://repository.certum.pl/ctnca.cer090%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://crl.certum.pl/ctnca.crl0k0%URL Reputationsafe
            http://ocsp.thawte.com00%URL Reputationsafe
            http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
            http://subca.ocsp-certum.com020%URL Reputationsafe
            http://subca.ocsp-certum.com010%URL Reputationsafe
            http://crl.certum.pl/ctnca2.crl0l0%URL Reputationsafe
            http://repository.certum.pl/ctnca2.cer090%URL Reputationsafe
            http://www.certum.pl/CPS00%URL Reputationsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://crl.certum.pl/ctsca2021.crl0ocfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
              unknown
              http://repository.certum.pl/ctnca.cer09cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.ncsbe.govMicrosoftcfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpfalse
                unknown
                http://ocsp.sectigo.com0cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.certum.pl/ctnca.crl0kcfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ocsp.thawte.com0cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://aka.ms/odirmleyexplorer.exe, 00000018.00000002.2963285066.0000000005258000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://standards.iso.org/iso/19770/-2/2008/schema.xsdcfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.0000000000418000.00000020.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpfalse
                    unknown
                    http://www.installaware.com/0cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                      unknown
                      http://www.installaware.comzcfrv_4_0_setup_ALL.exefalse
                        unknown
                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0scfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.ImgX.net/cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://aka.ms/Vh5j3klexplorer.exe, 00000018.00000002.2963285066.0000000005258000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://www.installaware.com/cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.0000000000418000.00000020.00000001.01000000.00000004.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpfalse
                              unknown
                              http://www.mywebsite.com/Newcfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002854000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpfalse
                                unknown
                                HTTP://WWW.NCSBE.GOVMICROSOFTcfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002813000.00000004.00001000.00020000.00000000.sdmpfalse
                                  unknown
                                  http://crl.thawte.com/ThawteCodeSigningCA.crl0cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    HTTP://WWW.MYWEBSITE.COM/NEWcfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002854000.00000004.00001000.00020000.00000000.sdmpfalse
                                      unknown
                                      http://repository.certum.pl/ctsca2021.cer0cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                        unknown
                                        http://subca.ocsp-certum.com05cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.ncsbe.govcfrv_4_0_setup_ALL.exe, 00000001.00000003.2324782144.0000000002854000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2103504605.0000000007AB6000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpfalse
                                            unknown
                                            http://subca.ocsp-certum.com02cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.seagatesoftware.com/xml/schema.xsdxsddtdwcfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000065C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://subca.ocsp-certum.com01cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://sectigo.com/CPS0Ccfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                                unknown
                                                https://www.installaware.com/buydirect.aspopencfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FFC7D000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000000.1800908445.00000000007AE000.00000020.00000001.01000000.00000004.sdmpfalse
                                                  unknown
                                                  http://crl.certum.pl/ctnca2.crl0lcfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://repository.certum.pl/ctnca2.cer09cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.installaware.com/InstallAwarecfrv_4_0_setup_ALL.exe, 00000001.00000003.1810056704.00000000FF8D0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://www.ImgX.net/ImgX/purchase.aspcfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000667D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://crl.thawte.com/ThawtePremiumServerCA.crl0cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000006836000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000052F9000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005310000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://www.certum.pl/CPS0cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000030DB000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005364000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005D5A000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000060EF000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005E8C000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002FA1000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.00000000054D0000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.0000000005FBE000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000000.00000003.1791435025.000000000320D000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.2107063868.0000000005534000.00000004.00000020.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822824417.0000000003210000.00000004.00001000.00020000.00000000.sdmp, cfrv_4_0_setup_ALL.exe, 00000001.00000003.1822743896.0000000003370000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        No contacted IP infos
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1542302
                                                        Start date and time:2024-10-25 19:16:47 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 10m 12s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:28
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:cfrv_4_0_setup_ALL.exe
                                                        Detection:MAL
                                                        Classification:mal48.evad.winEXE@39/565@0/0
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 99%
                                                        • Number of executed functions: 128
                                                        • Number of non-executed functions: 114
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtCreateFile calls found.
                                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                        • Report size getting too big, too many NtEnumerateKey calls found.
                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                        • Report size getting too big, too many NtOpenKey calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtSetValueKey calls found.
                                                        • VT rate limit hit for: cfrv_4_0_setup_ALL.exe
                                                        TimeTypeDescription
                                                        13:18:15API Interceptor1x Sleep call for process: explorer.exe modified
                                                        13:18:18API Interceptor24x Sleep call for process: cfrv_4_0_setup_ALL.exe modified
                                                        No context
                                                        No context
                                                        No context
                                                        No context
                                                        No context
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:modified
                                                        Size (bytes):225941
                                                        Entropy (8bit):5.035132423574649
                                                        Encrypted:false
                                                        SSDEEP:768:zTYJDHm0NZ/DVtVtVt1tVtVtVtVtVtVtVtVtVtVtVtVtVtVtVtVtVtltVtVtVtIo:HYocZ/DePXcx6qZa7FHa2Ufo2PoV6
                                                        MD5:3019A0B223D2B8B6115A14BE800E4D9B
                                                        SHA1:0D2A773262BA0B2BAC1A0D4EFB0DE65BD2909800
                                                        SHA-256:579148F332EB007E0619FE7E299A9DCD4AD6A927FEA3CEDA634DADFE9F3CF226
                                                        SHA-512:02526C4007A32D1873AD00604899886EDFB2490730B233CA018418C45E5446C7E5DCB55FCF8EAE50974D8015E4925B3B606D9345DCD439751693ADD04FA54EA1
                                                        Malicious:false
                                                        Preview:...@IXOS.@.....@CjYY.@.....@.....@.....@.....@.....@......&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}..CF Remote..cfrv_4_0_setup_ALL.msi.@.....@!....@.....@........\PROGRA~3\mia3DCC.tmp\&.{D529246B-78E5-4E65-A3A2-8E1040E91E59}.....@.....@.....@.....@.......@.....@.....@.......@......CF Remote......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{DBAF7F90-6797-4BCB-8426-E799FE0D75FA}&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}.@......&.{10B1E2F4-E12B-4D18-847D-3579632C4DA0}&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}.@......&.{70233733-63B7-4686-8B22-F467B98A5511}&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}.@......&.{100D9843-4837-4C77-9382-C4AB79C16EC6}&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}.@......&.{360CA8FA-B89D-40E5-8E5D-E0358F8448B5}&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}.@......&.{AAA707EE-74C6-4091-8DF1-A6063B1CAF22}&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}.@......&.{9C72C003-1DC2-41F4-AD0C-E99FEB6
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):4243456
                                                        Entropy (8bit):5.904631501447873
                                                        Encrypted:false
                                                        SSDEEP:98304:j24cB0pukTqkRXBpPw0l3mpkaL8vmN0sPVYaCKlOO5BRBwqyPQbgZ5WEVMRJT3VB:fcB0pukTqkRXBpPw0l3mpkaL8vmN0sPn
                                                        MD5:8963AF52B51008AA64C0DFC38978E561
                                                        SHA1:C76A9A66AFDB305791674B365B078B48343B7C98
                                                        SHA-256:F8D68F5A2685B78B8AD9B7FF3C1BD720AFC1F337EAE521AB8AAB6ACB5E5337BE
                                                        SHA-512:C2EF66D6AB3D075C706DCFC85B67DDDA7261A052B037B0E1854B64A9D58054503EB25214B62AFE565A9A7EDE8A981B280F4CCBCF253336000A7D42C3F6E19C06
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y....................................Rich............PE..L...a.ie..................@......... .........@...@...........................B.....{.@......................................{@.(.....A.~...................................................................(... .......d............................text....z@.......@................. ..`.data...`T....@.......@.............@....rsrc...~.....A.. ....@.............@..@..^............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):525
                                                        Entropy (8bit):5.0713464478909565
                                                        Encrypted:false
                                                        SSDEEP:12:MMHdt4N5SgVQ9TNRRgAhxAQkrEHUi95Jz:Jdt4XSgOTNRyADAQkrEHUiDt
                                                        MD5:E9CECB1E5CFDDF82CE102D096FC6DB92
                                                        SHA1:EEA233E02455050A95B7AD30FA42E077ED473293
                                                        SHA-256:499E0178C9C74ACC9DED7E9F66A99C2915C6ADEBF08D33907538180466D1535B
                                                        SHA-512:B61B1B718B9FF3F84174E3BA8CC2B6F1135659AADDA8C0FE1CFE3561F206A1746C48F16DD669C7E36AC960B0A4B1404739DADED074956A7454B738E37E1D6F47
                                                        Malicious:false
                                                        Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">...<assemblyIdentity version="1.0.0.0".processorArchitecture="X86".name="ExeName".type="win32"/>...<description>elevate execution level</description>...<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">....<security>.....<requestedPrivileges>......<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>.....</requestedPrivileges>....</security>...</trustInfo>..</assembly>
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:MS Windows HtmlHelp Data
                                                        Category:dropped
                                                        Size (bytes):302779
                                                        Entropy (8bit):7.927639628283951
                                                        Encrypted:false
                                                        SSDEEP:6144:SVRZVBdxgL1ART/Q+4Ghr6qUeaLAOw6cxf8JYxjv029IDuuj7Y79d/wq5fgSk:SVXVBzWAtQDGtnUxAfx0JEtGDR/Yj/dU
                                                        MD5:286D69BB312003FA01ECBCAF6587C7D5
                                                        SHA1:C611D2D743FC45A5BC419D0A255DB4A174100F77
                                                        SHA-256:F7EDE38A17EC24C0AFA54815DBEA222E17452C4A9A872B7FE462741B70199B6A
                                                        SHA-512:07A9D2C6F327873C4B2836FD6F434B1012C13CEE3816594C43430B0CA356814AAF0CAE4B490FEF8D89ED51112C3BF2FC240A2AA03B7183D135903B7E9B03F384
                                                        Malicious:false
                                                        Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T@.......@..............................ITSP....T...........................................j..].!......."..T...............PMGLV................/..../#BSSC...7../#IDXHDR....../#ITBITS..../#STRINGS..B..q./#SYSTEM..n.+./#TOPICS.....P./#URLSTR.....*./#URLTBL..P.H./#WINDOWS....L./$FIftiMain.....g./$OBJINST......./$WWAssociativeLinks/..../$WWAssociativeLinks/Property....../$WWKeywordLinks/..../$WWKeywordLinks/BTree..[..L./$WWKeywordLinks/Data...'.(./$WWKeywordLinks/Map...O.../$WWKeywordLinks/Property...i ./AccountTransferAdd.htm...B.~./AccountTransferDelete.htm...@.7./AccountTransferEdit.htm...m.+./AddingACandidateCommittee.htm..._.C,/AddingAElectioneeringCommunicationFiler.htm......'/AddingAIndependentExpenditureFiler.htm...".0%/AddingAIndependentExpenditurePAC.htm...7..#/AddingAJointCandidateCommittee.htm.....`&/AddingAJudicialCandidateCommittee.htm...".w./AddingALegalExpenseFund.htm...U.D./AddingAPAC
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: 1998 Discloure Report, Subject: 1998 Discloure Report, Author: James Lell, Last Saved By: James Lell, Revision Number: 101, Total Editing Time: 08:02:50, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Tue Feb 22 13:39:32 2005, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):442368
                                                        Entropy (8bit):5.764291489711934
                                                        Encrypted:false
                                                        SSDEEP:1536:gqriKCi4JCS0DlTzwKg3Vj/I+HJL9uEXueM5g2ggLR4BZG3OF6OIIKE85+DN:gq0I5cJXXuQ4
                                                        MD5:4623BE2BABA8AF4A48897E14029EE29F
                                                        SHA1:12F217A06B3ADD4A579D6E6F4BFF0D60D44F256D
                                                        SHA-256:24A472D4FD42007DE58116171D84B77906C90D6781C835CCFFF1F3DD704A074B
                                                        SHA-512:423FD6ECC7F377CAC0EECB7F5B173171E6545FFBAE2964CC33A85114D9D62F783D0ABB6B83C3E00C127A58E74ABDD3CD28B420E503EDAA78B0BF485C22CF7235
                                                        Malicious:false
                                                        Preview:......................>...................................................~...............0...................................................................................................................................................................................................................................................................................................................................................................................................................................S.u.b.d.o.c.u.m.e.n.t. .8.9.....................................................................................................C.o.n.t.e.n.t.s..........................................................................................................L......D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................................t.......S.u.b.d.o.c.u.m.e.n.t. .1.0.1................................... ...................................0...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Account List, Subject: Account List, Author: James Lell, Last Saved By: James Lell, Revision Number: 47, Total Editing Time: 07:03:51, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Tue Feb 22 13:38:30 2005, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):17408
                                                        Entropy (8bit):5.353280867175744
                                                        Encrypted:false
                                                        SSDEEP:192:en+EcA/aGyp318p8x3Wb5vNxjOJMHCdrYvQqFvAi1mnYuA8Z7Bu7P7Z7b7gUSA7Q:BjASGyp3uNhJ73O
                                                        MD5:1A6030B5072235B0965869D19E08A9BB
                                                        SHA1:BB3A30F534C655B1E2726219CA5BF49B817A2C58
                                                        SHA-256:17098538A0A0EB865ECBAA17D00CFD09AB83400DA70BC9AE467C506E0F05CBA7
                                                        SHA-512:2313A99DA787F451009A3BEC94BD4BFECA8A9FCBCAED3954F2923918B0DC1BBEE9E69E82AC978E864E1291692020F246D22F30D5FEF1EB8BBE78901B516EB3F9
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...........................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Contributions List, Subject: Contributions List, Author: James Lell, Last Saved By: James Lell, Revision Number: 113, Total Editing Time: 12:36:42, Last Printed: Tue Aug 18 20:22:57 1998, Last Saved Time/Date: Tue Feb 22 13:33:52 2005, Create Time/Date: Sun Feb 9 18:04:38 1997, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional
                                                        Category:dropped
                                                        Size (bytes):47104
                                                        Entropy (8bit):5.729017991338511
                                                        Encrypted:false
                                                        SSDEEP:384:gYbjI9PoSInCZuHqSTMRHXu+I3PWoCYnp:gYXGoB
                                                        MD5:A02E3ED15993B8B8CF631068941EFDFA
                                                        SHA1:68609F9F0CCBF698D602F15DF2783ED919B48DE3
                                                        SHA-256:19EEE76FD82EC48C325BC696D85989C20BA39DC4D9903C440ECC8A3A91A9E2CC
                                                        SHA-512:997B08C754A5D0625F39311971BB6113C44EE69F9DB7C3B6D1EC676C9591FCFFD40E428A042A677CB2237DCBE1AD7CDCB463BF721365C9541BD2CEFEB27EDC29
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Disclosure Report Cover, Subject: Disclosure Report Cover, Author: James Lell, Last Saved By: James Lell, Revision Number: 71, Total Editing Time: 09:09:36, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Mon Feb 21 14:12:42 2005, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):102993
                                                        Entropy (8bit):5.775513240751137
                                                        Encrypted:false
                                                        SSDEEP:384:8iPllYflrU4GTGvsz057kQz5xACSYwp3m6MgqGFSIU5DmQ6rfmsduaaahWpQCcxI:ZllI+DQzXAgg3cDtjpM3a
                                                        MD5:D6C23BB2D2B74DE1C9C452C58ECB7477
                                                        SHA1:63409B79C746B01C0F12A76BB511849D77B709A2
                                                        SHA-256:956C888758279B814FEDD7F48D76DFD49F5DF7C75A3FD23FDE0F97BAF0D710AE
                                                        SHA-512:A43BEACAD2716DF068C68F5FEEB529BBBB2D89706ECC9604BF86F422F26558C98C304387CE134408E329D550E0978F385E0825ED15F4ACD88B94095EB0473A96
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Debts and Obligations List, Subject: Debts and Obligations List, Author: James Lell, Last Saved By: James Lell, Revision Number: 74, Total Editing Time: 05:41:49, Last Printed: Wed Dec 18 13:51:44 1996, Last Saved Time/Date: Tue Feb 22 13:38:41 2005, Create Time/Date: Sun Feb 9 19:12:49 1997, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional
                                                        Category:dropped
                                                        Size (bytes):52224
                                                        Entropy (8bit):5.638520545168639
                                                        Encrypted:false
                                                        SSDEEP:384:VA3VCHSQW4z84Bd9CGLVJkhzWRajCIFaydsm4GM:VA3VCyVR4BRyK
                                                        MD5:C5B71EFA6AFA72802DFD0D8055D128D8
                                                        SHA1:77DA5148A255488EB4BD30493D2D3BD6DF11735C
                                                        SHA-256:8F16CC0CB03D6406F4C6A7612F4C9D94D43DA774FC1C6662D76329B177B91F19
                                                        SHA-512:5C8F634210E3E75F0EFF3975112E7C30AD166B1F8067AFBA65155F6339D198F10E5B5CC2D89CBD2422C32E0AA44EE75F4B00E5F3D936C03C360A3DBA1F0F45EE
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Expenditures List, Subject: Expenditures List, Author: James Lell, Last Saved By: James Lell, Revision Number: 74, Total Editing Time: 09:02:18, Last Printed: Wed Dec 18 13:51:44 1996, Last Saved Time/Date: Tue Feb 22 13:38:47 2005, Create Time/Date: Sun Feb 9 19:12:49 1997, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional
                                                        Category:dropped
                                                        Size (bytes):45056
                                                        Entropy (8bit):5.681619568331793
                                                        Encrypted:false
                                                        SSDEEP:192:DNBaBX0B2BUz5jTRE8gxgdPk4tHze8yYWU8M1lt/EsrAmbaplydwDyTgzIF8WPka:ohmNx/zLbkuMC9OqjHWN/VYQBSSu/p
                                                        MD5:761DBD0A2426A34D51F3362C051B37F9
                                                        SHA1:5CC1CC3206398C6D7C121EBD2F676C36E9833A94
                                                        SHA-256:1C0FC5BD6548947A189BED1A0EC51661528A725202E35792D9699C73C095B796
                                                        SHA-512:D437D6041EC1A412415AE1F99EFB040D8E137378A53CCD9B03F26B1CE38C32ED1294C23D7264C6D8FF59CF39D26B9FF86747AFE7AC99EC7CB50DAB89F5F13C70
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Endorsers List, Subject: Endorsers List, Author: James Lell, Last Saved By: James Lell, Revision Number: 45, Total Editing Time: 03:21:14, Last Saved Time/Date: Tue Feb 22 13:38:54 2005, Create Time/Date: Thu Dec 19 13:29:16 1996, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional, Security: 0
                                                        Category:dropped
                                                        Size (bytes):17920
                                                        Entropy (8bit):5.421908987486584
                                                        Encrypted:false
                                                        SSDEEP:192:2LAHPNxk0i2OLPU8GV8BErS8x3Wb5vNxjOJMHCdr5w7lqm9AmAYm9quAm97ZyPbF:W47k33/MrM4A
                                                        MD5:BFCC78606337F1ADD7B87FC8E1C8C734
                                                        SHA1:99B2673556D8A8730DDF60BA15A58BDAAFC9FC4A
                                                        SHA-256:85CE8C392A2E7FEEE7FABE7A1F3E0F70C7F61F0EF20203EA343F025017803EEA
                                                        SHA-512:7CC684AE706896B4D4C624941C7D71E6CF8D4C388FC02ABA50DAA23FDE8F9A145C0E998788FF01A9902AF469103281FC8B378F902BCD5E9DBB21DF2C6FADA27A
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!.......................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Loan Proceeds List, Subject: Loan Proceeds List, Author: James Lell, Last Saved By: James Lell, Revision Number: 71, Total Editing Time: 05:07:43, Last Saved Time/Date: Tue Feb 22 13:39:05 2005, Create Time/Date: Thu Dec 19 13:29:16 1996, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional, Security: 0
                                                        Category:dropped
                                                        Size (bytes):59904
                                                        Entropy (8bit):5.764839915499194
                                                        Encrypted:false
                                                        SSDEEP:384:2VsucDl8+hn7iszAu1YYDJP99qdKjHFCvCiZ/sHxz/JJ2afOj:isu+uu1YY1Pb
                                                        MD5:DEF0B47C2A857A3380C7DD9FC55BD7AA
                                                        SHA1:A42C01237FCEB20AF3C679ACAE403EE64FF0A080
                                                        SHA-256:AC75DAC13D2DA4BB0AA279C8FB4C45EB2235111F30C76602861768147D61ED98
                                                        SHA-512:CBA2B92BEA3EEA5E8ACC866AEE856BEEEC8DFCFF7470E5CDB22C7DA5E0AB48682EBD9966D00B11EAF750533FDFB0409145671FAABA93FEDC1EFAFA6386B7234D
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...............................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Loan Repayments List, Subject: Loan Repayments List, Author: James Lell, Last Saved By: James Lell, Revision Number: 33, Total Editing Time: 02:32:42, Last Saved Time/Date: Tue Feb 22 13:39:11 2005, Create Time/Date: Fri Dec 20 15:00:22 1996, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional, Security: 0
                                                        Category:dropped
                                                        Size (bytes):41472
                                                        Entropy (8bit):5.6245741985399995
                                                        Encrypted:false
                                                        SSDEEP:192:22EQNdickudiauN8dEZEQcAmbUipjatZkLWkC6lnU/c5HhW8x3b5vNxjOJMHCdru:0QN3ub55LOnz1BNdZSkw4fjjfnWX2R
                                                        MD5:D96F0BFA34C620CB0904A5C7CD652D76
                                                        SHA1:8848F994A2873BFA2BC73DFF35A8D1C617575DFF
                                                        SHA-256:367CC798B9F28285A257274083D43D9CA34822AFBD0026BD7A6B407651AF5F38
                                                        SHA-512:5207ACF7F10F23DB57FAB85126A7BE970C104088562128B2D982F9CF23C5177558DAAD6063E3A1897C0A1AE65A46D313FE9C32F4B394434455F00BB0E650D97E
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...............................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Summary, Subject: Summary, Author: James Lell, Last Saved By: James Lell, Revision Number: 50, Total Editing Time: 06:54:28, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Fri Jul 9 19:49:26 2004, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):93814
                                                        Entropy (8bit):5.439847807690734
                                                        Encrypted:false
                                                        SSDEEP:384:SGmlkmzysH867TSqxdEjuPCPN2ScQ12ScrOgVzRDoYsg7VSclhhy6gGhJA1zfcOy:gtc67TSqtPCV2S0/
                                                        MD5:AE82C60145B9DB14E62CFFEDCFDA30E6
                                                        SHA1:8853BB15A95A0C0BAA23AFC99EC7CDB9303D4974
                                                        SHA-256:164E5BD41A118A0075260EF11CC157C3AE23D6EC287E1C0F6C56AC0D97CBB627
                                                        SHA-512:9189A0A9FD15A60BB293F3DDC9D9DBA1AA4EFBF23C70DB81E6A0CA12528F541ED09CB8B9359CEF9F7367BA05D22FF1C46DE8504154F41147CA00F9B462E74EAB
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 62, Total Editing Time: 02:41:01, Last Saved Time/Date: Thu Jul 29 14:33:26 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):2074624
                                                        Entropy (8bit):5.277108105692261
                                                        Encrypted:false
                                                        SSDEEP:3072:tAcGm88F/D6zksqVGpStaTbIfkI15eJWFNHXaPEOrZGERaot3n5fGeZlVE/hP5Zj:t5YksqVyStMwkTsFda/geZ3E/hP5Z
                                                        MD5:3BF8C3B91E578461B194D6620D227F23
                                                        SHA1:254D4D58E68F01DE591E9207898B0774499E98DC
                                                        SHA-256:D38D74FBB7818D5E01251D91E290BDF2B8C0F2835F45E18039A4426FB536F20B
                                                        SHA-512:8FF5177AC387B55FBD39712C3578FEA41F8447479B49C56FE6F66FDB31E12385D328867C3441C9A7DA2D100E38D14EB615D70D439F7DF3E38D5233381E8737C3
                                                        Malicious:false
                                                        Preview:......................>................... ...3.......................................{...L...4...N.......................(...........~...r...t...........Z...............}.......c...b.........../...y.........................................................................................................................................................................................................................................................................................................................O.l.e.............................................................................................................0.............O.l.e.P.r.e.s.0.0.0...................................................................................................d.......S.u.b.d.o.c.u.m.e.n.t. .5.5............................................."........................... ...pu.. ...pu..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 16:11:52 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Wed Sep 29 20:57:07 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):435712
                                                        Entropy (8bit):5.210313030830372
                                                        Encrypted:false
                                                        SSDEEP:1536:DhRq0fBeerIhQVQ+3I+9gc9R6P7KUJSXCMxqAG1V4vS+Zq8veRNXncMEUR21HF:7ser/9WTPTJSXCMxqjevS+ZTveB21
                                                        MD5:9953C4F01E97E2EAF6D408A9637954AA
                                                        SHA1:C0CA83C8458AA1A569586CF343E7AC6ABDA51F32
                                                        SHA-256:D64D4097CC36841AE5E105119E7BD9AF6E099E203C2B6625B5170CCB3AA9EE10
                                                        SHA-512:43A445C46110992A37B40A9B3D73C89443024FEE6374C7B0AB8B3D047CF5888F0DC25C6FC6A11E8139AA5838907D7005BD11D2A58405679F3D14AF8022BFBA1D
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2320.ttx..........cro-2320.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....HC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2340.ttx..........cro-2340.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....HC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2330.ttx..........cro-2330.ttx.......................SQL.....Pdsmon.dll....%Act
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 16 15:54:41 2003, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Wed Sep 29 17:56:45 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):474624
                                                        Entropy (8bit):5.097844904674963
                                                        Encrypted:false
                                                        SSDEEP:3072:mWnYtI5uI5ZzxgLD9yQl2FzHc6AsnkrRcycDCTCQd4iNbN:mG5uaml28/
                                                        MD5:B27917F1EDBCF0193DD90615BEC558A9
                                                        SHA1:6FD7536E2D2EDBA9F19AF0C38CEEEE77FA5FD524
                                                        SHA-256:37162A3D98BBB39027C9E77394BE2928E22E50967213B9FCAA1B371E60B1B298
                                                        SHA-512:293BB3097A5BEC7C6A757811C1B4F76247C93E39E3BEA5285F80EA31EC8267725B1BC811F2DCC5386B6A191D8C32B8303F18D3165418D740D17414272539ED04
                                                        Malicious:false
                                                        Preview:......................>...........................................................<...6.......}.......~......................................................................................................................................................................................................................................................................................................................................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................:...`.......S.u.b.d.o.c.u.m.e.n.t. .4.6.............................................g...0.......................p..,.1.....,.1..............C.o.n.t.e.n.t.s.....................................................................................................?...........D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 53, Total Editing Time: 02:01:06, Last Saved Time/Date: Wed Apr 14 12:43:38 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):200192
                                                        Entropy (8bit):5.169152554231805
                                                        Encrypted:false
                                                        SSDEEP:768:gY1gd28LOecPd/HWE03kAoEl1FVledXN/bYNsnDnNH33wvuatdTuBaBn3Dn5E0fp:n1gd28LOecPVSkAPNyTx3wvuRBaNDVV
                                                        MD5:A64029646B20A91508A70A4BD30D777A
                                                        SHA1:53C5AAE52951DD3E493EF04295B345CD0A4A3828
                                                        SHA-256:39BC863CDECC987002C7BDDBEE15FB0226C4640B795E11B6FDC12EF90F3AB48A
                                                        SHA-512:A5F3EA125987F11157CFC76DA99A5D816C665CCDFE6D9FA141D5AF5D926F85504B8EECCE417570D413DEDDE8EA4CF2C3E4F2FDCC585A0F04FF343E83C1FB4347
                                                        Malicious:false
                                                        Preview:......................>.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...........................................................................................................S.u.b.d.o.c.u.m.e.n.t. .3.0..........................................................................?O.."...?O.."..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Wed Apr 29 22:15:36 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):160256
                                                        Entropy (8bit):5.0388804598932895
                                                        Encrypted:false
                                                        SSDEEP:1536:P1eto9rC6gvneLbeMXHwKY0/Fb57GgYINSfUSfBg:Y6mMXHwKY0/KgSH
                                                        MD5:4695DF6904EADF85F3BB5A039159BB20
                                                        SHA1:BDB639C12D0ED8A8C0393169D51859282D5FA7EC
                                                        SHA-256:0688E65C8A9DAFC70CBACEB99A5B9C97C15E8545149BD907D48F6CB4472EF896
                                                        SHA-512:02C191C002D5D212ED30893EA8E561A1C07FE1E86B49D6A1F40E7960B95B28EA241EB7F953D00681B76AC5798532CDCFD1FAFDC3B46DF416C8D118C5A4D4C6A2
                                                        Malicious:false
                                                        Preview:......................>...................................z.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...............................................................................................A...Fe......S.u.b.d.o.c.u.m.e.n.t. .3.8......................................................................... .F......IH.................C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Mar 5 20:19:07 2004, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Mon Nov 19 15:30:01 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):2127872
                                                        Entropy (8bit):5.298889348940432
                                                        Encrypted:false
                                                        SSDEEP:6144:nEd7toe+rgeeNPGd7crgEpc8mwE/hP5r8:nEdHiA9c2E/hP5
                                                        MD5:74FDFC53C374A476FFDFABA9958F8D42
                                                        SHA1:BFE8448D89E848DD7A14EEB8CC10DB0082B04198
                                                        SHA-256:71D0000B9B8E8DF9F9E34B81F7BBDD0529C0B8D99BAB2DC83170628C34C33DF3
                                                        SHA-512:1DE68F6ED46CF91F47110697F97058B7793794455EFCB73F57501FA683EBD004AA2285326E43D5264E12594973BDC49E8CBEE6A580B170D7E0F34EE312054412
                                                        Malicious:false
                                                        Preview:......................>...................!...................................d...m...o...........%...............L...............s.......D.......C...................W...............z...m...J.......t...u.....................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.1...........................................................................................................S.u.b.d.o.c.u.m.e.n.t. .2.7.6................................... ....................................>........................C.o.n.t.e.n.t.s.........................................................................................................x.......D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: State, Name of Creating Application: Microsoft Excel, Last Printed: Thu Jun 15 19:07:57 2006, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Mon Jun 19 13:10:06 2006, Security: 0
                                                        Category:dropped
                                                        Size (bytes):2065408
                                                        Entropy (8bit):5.312823323440365
                                                        Encrypted:false
                                                        SSDEEP:6144:8Ed1Xb0+PgeDeGGHERLAEgipEXZacZzl9zjBABgppv/5/vR6WOyx:8EdFEwMi9cZzl9z
                                                        MD5:756B7BA54EC030397464A91A2CA8A8F0
                                                        SHA1:46DBA88F3E7B08D7CC26F2A771E4C0D233140153
                                                        SHA-256:6D27506B998E52767972E9BE275509AE1287640C3CABA0D850E21BE9D4E62844
                                                        SHA-512:F35B723ED73D6BE222F402C6839E4E042949AAC33ED959CD82782672FF9AAE4695DC45F7D63317184267A07D085B2FE5001D528B70ADE57DAB68BFDA96BBCD1E
                                                        Malicious:false
                                                        Preview:......................>................... ...f...............................d...m...o...........%...............L...............s.......D.......C...................W...............m...J...h.......~.........................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.1...........................................................................................................S.u.b.d.o.c.u.m.e.n.t. .2.7.6................................... ...................................0".......................C.o.n.t.e.n.t.s.........................................................................................................x.......D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 52, Total Editing Time: 02:10:55, Last Saved Time/Date: Thu Apr 15 16:01:09 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):901120
                                                        Entropy (8bit):5.196993760121088
                                                        Encrypted:false
                                                        SSDEEP:3072:C8q9+TeL0hZGnIillNma52eiBisyZm9aahAN:r6Jc
                                                        MD5:B64E6E0CF32FC4A7CCB5C8D3BB92381D
                                                        SHA1:427DBECB4E18B11CDC6EE54B4FCEA1231535DFDA
                                                        SHA-256:5019F534DC87B51EDFB8DFF231118328587CCD3572C595E452E57AA7B84E74F3
                                                        SHA-512:B87857D15D620FE3AE41B0B8761B67FD85ED48D65EB4D081FBC12A94C6ED2303972341B2B4C076C898FBB4063342E8A49DEA5357F0DE559FA6E59423B83B40A0
                                                        Malicious:false
                                                        Preview:......................>.......................*...............................................................3...........$...,.................................................................................................................................................................................................................................................................................................................................................................................................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................2.......S.u.b.d.o.c.u.m.e.n.t. .4.2............................................................................|.".....|."..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 76, Total Editing Time: 06:03:59, Last Saved Time/Date: Mon Jul 28 15:25:51 2008, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):187399
                                                        Entropy (8bit):4.9388946711249355
                                                        Encrypted:false
                                                        SSDEEP:768:hP25wAQghxgQwBRaKgQwAQBRhxBRRAgwAQCF1lS8Fgwfv/mTnFGZE/hP5Si6N+2/:huOjFuE/hP5Si6x62
                                                        MD5:D09CD0BF633CD0605976F14AE87B35B9
                                                        SHA1:6FDE766F4DB41383C067AB5179CE47D83413F5B2
                                                        SHA-256:D63BEBE3FC83950403F69AFCEFAB59612F44B3D5817C419F3383D95A079BC025
                                                        SHA-512:297F15C9315AB2159C8630C14DA3E9C25B1A0B200B51A64EF3EB2A82FEA4619D61A7024A07C166C17B6DE8440247193247F436CD1C8383C95B8F3C4D4E46583F
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m.......................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 53, Total Editing Time: 04:08:04, Last Saved Time/Date: Fri Dec 17 19:08:06 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):61440
                                                        Entropy (8bit):4.833909151781048
                                                        Encrypted:false
                                                        SSDEEP:384:G9NvsBioHfL2O1hhCncEnYeKnDslIADOrlBHYH3sVIc:JL2+hwnDnYeKn
                                                        MD5:010437FD9249DE33A524028CB861559E
                                                        SHA1:343EEE5E9C4F8CCDD3BA0962BE55238D58F3F448
                                                        SHA-256:07E783E5242BFED746924B7678AADABC12C52E463EC0161778BDA98882073612
                                                        SHA-512:DFD2E2E68ED5C8624EAC69EB559F45FE5F08A902745E400CF7AB1ACF3B8800B919CA74851783DD94CCE313027D5F9BFA69CFD9B88F4773151C24F5F0BB2C40DB
                                                        Malicious:false
                                                        Preview:......................>.......................E...........A...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .9..........................................................................F....`!F.k.....I.k.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................*......E.m.b.e.d.d.i.n.g. .1.1........................................................................F......M.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Mar 5 20:19:07 2004, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Mon Nov 19 15:30:01 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):161356
                                                        Entropy (8bit):5.177382724517874
                                                        Encrypted:false
                                                        SSDEEP:768:ep2c9joPH0MdlojY7vmW1EtujSD9DvcRwS+Ln9:9c9amGmWAujI9DvceS49
                                                        MD5:38AE604FEB6ECCB8EF90ED989E95B55C
                                                        SHA1:1B48DFDB4F3572758EF88460B29D03879620AC5D
                                                        SHA-256:61E0E173791B801B023AF5987484487A59CF5FE19C0642BEC8BFBE49677451F9
                                                        SHA-512:3C41155FDF0A2963C87F1272899C6E3A8C525E2C6982BB080624C8374970B02AD4BD36BFBC570975147BD3E73C3304D71960D48767C7172F45847B9011F28D40
                                                        Malicious:false
                                                        Preview:......................>.......................................................]........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 65, Total Editing Time: 14:30:00, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Wed Dec 22 20:39:36 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):65024
                                                        Entropy (8bit):5.10343096382262
                                                        Encrypted:false
                                                        SSDEEP:384:wIyubiGxnps2q3/FanLN4oCYoBUXmfZn11DP5MN5GY3WqN1xYNifO8fda9C44CVD:wunpTq3/FaZFXmfZnj
                                                        MD5:097E6B26FE7DD4437D8A343EF52EC517
                                                        SHA1:BF9B400E4D56BD9D4D6E58CF07F5647428BDB03D
                                                        SHA-256:79ACD4650E807D66454E0B6B935D3A7E7EFCB728C1DDF33DBA6F65CFA074BA58
                                                        SHA-512:E6D13C7D55F6C803E530F6BC358ECC4282F32C06F5F75F45FFEE7E05CD1A29CA24E4E1799CBEF86A8325DD46FA6FB88451A4C487B6B642DCD80D710C695B4E8A
                                                        Malicious:false
                                                        Preview:......................>.......................;...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.0........................................................................F....@..Yf...@..Yf.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...............................................................................................p...p.......E.m.b.e.d.d.i.n.g. .2.3........................................................................F.......Y
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 125, Total Editing Time: 1d+06:37:40, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Apr 2 15:23:54 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):108725
                                                        Entropy (8bit):5.347342388943793
                                                        Encrypted:false
                                                        SSDEEP:768:Etuya2n71onFjEkEOnUD8hS2ktBmm8F/pm+g:Et5oLC8F/p1g
                                                        MD5:24625381A4A79D98BB9D42D6B7F9A5FE
                                                        SHA1:5D71A3C809D7DBE54A1D7D124C56471B419F1A7F
                                                        SHA-256:391152A4E0F66892A48EF07066A845E346C749ED479501402C907BA3E4639677
                                                        SHA-512:9263939EAB0EBD221D17F45A76AA0CF00F4A38E6204E25990B4C1226D06035D7856F3F6239BBCC86F81B9C4DDA1A46BD741FE9976AE50780B69BF078B38075BF
                                                        Malicious:false
                                                        Preview:......................>.......................E...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.8........................................................................F.....7..2u.. ...2u................O.l.e.............................................................................................................C.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .2.0........................................................................F......!.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 60, Total Editing Time: 1d+02:34:48, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Apr 2 15:44:49 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):89600
                                                        Entropy (8bit):5.324389651089383
                                                        Encrypted:false
                                                        SSDEEP:384:AUfKDNLa1NuYqe26TngjniVd9znZUAQ1FYRzJ8+m63q6dUyAyxjR4avUuVxV79eV:pR2OngjniVd9znfTRDU
                                                        MD5:D4AF83ED906C7B634BB7988F5FC77D9E
                                                        SHA1:2C473D306D0071F75D891A2F108677E4563D8609
                                                        SHA-256:96D3F4B240FCAEEB80222FB2107C4D1274FA3E87E46CBE11F5465657B143C28A
                                                        SHA-512:FA3B57EC70D34C33BAA41891FC2C8B4A34113027C9B1BE743F14E3EA823E6AAA9E296CEE1A3B1FE8E210DFB2A3A02BF2AAA777EE79642729D7E0813268F05074
                                                        Malicious:false
                                                        Preview:......................>.......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.9........................................................................F......)w5u...-.w5u................O.l.e.............................................................................................................=.............O.l.e.P.r.e.s.0.0.0...................................................................................................8.......E.m.b.e.d.d.i.n.g. .2.1........................................................................F......:w
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 56, Total Editing Time: 11:09:29, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Apr 2 15:46:24 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):112773
                                                        Entropy (8bit):5.250973108086118
                                                        Encrypted:false
                                                        SSDEEP:768:EX82dynZ8nzdp1UQhrV6x0KvnPC5F3RnO:T4LLOPQF3RnO
                                                        MD5:C776CCEA447F74098919D2CD84E21F27
                                                        SHA1:39A2C1D292006A4EFF7572393DBF5534D835C95A
                                                        SHA-256:EA699B7EA87FC4A1F48ABEDA29707D3991950ADD632B54E5CD82D6ED6E19E5A4
                                                        SHA-512:E7A0001ABDABD65F597C77688A14291AC67FB993BFFEFAB98B35548832DA0823435D4C694CE26E2DDF8D91AA2A39EAE8A52A938463F70BA7074C6F879A7AD982
                                                        Malicious:false
                                                        Preview:......................>.......................O...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.2........................................................................F.... v}.5u..`...5u................O.l.e.............................................................................................................@.............O.l.e.P.r.e.s.0.0.0...................................................................................................8.......E.m.b.e.d.d.i.n.g. .2.4........................................................................F.....K..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 65, Total Editing Time: 1d+15:03:26, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:13:15 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):108914
                                                        Entropy (8bit):5.248018963968515
                                                        Encrypted:false
                                                        SSDEEP:768:U48gnilnzJ1HdBEXHHXiQtsCnm5KYiuqqmrRQ:UekzJb4sEEziuqVVQ
                                                        MD5:12CB40DE811F5393136639186EFD472E
                                                        SHA1:22AA2F1FFAEEA90D910E93EDA4DC1B042769DFD5
                                                        SHA-256:EBD8E59E2EBBC54B139F101EDFDD4972A7466AE8836D956F78BE53258F960A93
                                                        SHA-512:3DB9E9380DEAECE075B4F82D81E881B385191BC48517600AAB48428669CDF9F13E6D108EC26FF0B1B914E368E0A6B4E8F9D967132556C9A2A781D73844D711F3
                                                        Malicious:false
                                                        Preview:......................>.......................Q...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.5........................................................................F......r..u...<~..u................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...................................................................................................&.......E.m.b.e.d.d.i.n.g. .2.7........................................................................F........
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 69, Total Editing Time: 1d+06:12:29, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:18:06 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):98304
                                                        Entropy (8bit):5.336808297146148
                                                        Encrypted:false
                                                        SSDEEP:384:nZ3AqRFh9vx5LsU1WtnPMn3kB/lH8gUPVncL3heqR3TzGaQnQ1nXLuM3X3s3tkRh:5vx5LsUEtnPMnUB/lRUPVn7MHcM
                                                        MD5:A38D6C5A69B882D02ECF73C0E5AFAAE1
                                                        SHA1:0B8C51858A55123050184ACAA72D031C82B34968
                                                        SHA-256:84EB99CD7F7F121443C559759B9E79DB0095F6001B304E343BEFB14876BE21E2
                                                        SHA-512:2DFF4584EED803BDCF89F8B4764180B354E6A0A56A016303678643D1BBD6FD797006CD05044C03E880FC7B7489029ED3AD7EFF7179B0ED3AF2C07F078F9AE94B
                                                        Malicious:false
                                                        Preview:......................>.......................G...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.9........................................................................F........u..p....u................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...................................................................................................b'......E.m.b.e.d.d.i.n.g. .3.1........................................................................F........
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 77, Total Editing Time: 13:19:08, Last Printed: Fri Nov 19 19:45:23 2004, Last Saved Time/Date: Fri Jan 21 14:19:25 2005, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):87552
                                                        Entropy (8bit):5.292860622249849
                                                        Encrypted:false
                                                        SSDEEP:384:0IVAgpIDVV3pdY7J84+ZEHnUzmLmCnFJBPncQ5olvPmKgTQVbDpdTC0xIBpIlxyi:UBHpS64+ZEHn0CnVPncxcA
                                                        MD5:D57ABF650F3A7C4ABAFE3A95464A576E
                                                        SHA1:888CC2AB4F445D3C25F5030ABC91839D7A75F015
                                                        SHA-256:4F11CC3F6D5DBA4EC2B1A05ABF3819BA081F21131B80F092F0E8A4EC0E8109A4
                                                        SHA-512:C46831025A5856D9559A9EE045105931441F2EF813202FCA6DFD7E33D71CF63175103BAB94E4F0F07E98E66E21746B182C9F550942E3CECBCB655437FC48509C
                                                        Malicious:false
                                                        Preview:......................>.......................@...........0...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.2........................................................................F......5....`|.5..................O.l.e.............................................................................................................8.............O.l.e.P.r.e.s.0.0.0....................................................................................................:......E.m.b.e.d.d.i.n.g. .3.4........................................................................F.... ..5
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 81, Total Editing Time: 1d+08:19:54, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:20:08 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):107061
                                                        Entropy (8bit):5.2458729633908385
                                                        Encrypted:false
                                                        SSDEEP:384:pGEVny+Or43UTn0jgysu+snyMQnf07AGfiEgwmrqnqMYF18r6q0fcdcClUvKPLjU:tZW10jgysu+snyMQnCAGfiEgwm+nqqDw
                                                        MD5:0E08FBEEF0207A68F62D4B1D7DEF1C7A
                                                        SHA1:D27D5D35A399A73F82025A1EDCABE1E2071681B8
                                                        SHA-256:40E0F4AC3C8E326230535E4553AEC1B51F941A863417538E5EDF35A86F2B7F6F
                                                        SHA-512:51B6660B2667AB4E6312BBD54765B15150D24C8E93A07F0755DF4733936323A8614F2F15EA6016D1CD1E69D2DDB398A6442B94F4F82C74E7154A86AFCF29E500
                                                        Malicious:false
                                                        Preview:......................>.......................P...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.5........................................................................F........u..@...u................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...................................................................................................,'......E.m.b.e.d.d.i.n.g. .3.7........................................................................F....Pr..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 84, Total Editing Time: 1d+08:03:53, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:21:39 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):106941
                                                        Entropy (8bit):5.190240409169272
                                                        Encrypted:false
                                                        SSDEEP:384:1/3D+TQ+w2k8nbrnHvqKbV9QhrVRxhBRUQ7ItnF+PQXj01JoRTqQVeOBGws9t8O7:Dh2k8nbrn5QhrVRxhBRUQ7ItnApbRz
                                                        MD5:D5250C1D0DC2D60F86C6F3709FFD814D
                                                        SHA1:2043CE28896350EE6382B3172C5766332B09D890
                                                        SHA-256:36C9C8DDB2D33CABDE074D4D11E53CF22E41C822B0CB6C48FC64CE6036B9494B
                                                        SHA-512:3C6B69E7FA422A1597F3C75F24163F7D75FD0E357F6060C610CB71AE1CE7777E01BFE58B0B4268AA1316F653BBE1DE34A001270C43322D1D4D577D899FC3F6F7
                                                        Malicious:false
                                                        Preview:......................>.......................Q...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.9........................................................................F....p.?.u..P..?.u................O.l.e.............................................................................................................9.............O.l.e.P.r.e.s.0.0.0...................................................................................................$.......E.m.b.e.d.d.i.n.g. .4.1........................................................................F....p#.?
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 96, Total Editing Time: 07:53:47, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:22:29 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):100864
                                                        Entropy (8bit):5.165912085213481
                                                        Encrypted:false
                                                        SSDEEP:384:xMLqp7YPTQPy7qUDcNinkW1dlE31rlsI2nG9XdjnHjjIH2An0zuuNz8wcNAMULKM:q3BDwinkoCD6nG9XdjnHjjIH2AnsBPY
                                                        MD5:41E08E237789E1CD4CA9D79EA0104A51
                                                        SHA1:35822182ADD8504CBAD4F16E2A2709F1B79BB859
                                                        SHA-256:4E5371E38A984141C2F9922C1A1FFAE659F0E33D86ECC0381F2F24595187634B
                                                        SHA-512:EC7386B8FF167AC216B796B7FD684560B2D51E0C9452F94AA01BD6BC4EE9471ED019035744B464973E1E8C3B9B5D3741C15758678DE1D6D1A1E4AEBA79801E0C
                                                        Malicious:false
                                                        Preview:......................>.......................P...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4.2........................................................................F......c.p.....f.p.................O.l.e.............................................................................................................3.............O.l.e.P.r.e.s.0.0.0...................................................................................................4.......E.m.b.e.d.d.i.n.g. .4.4........................................................................F.....Fr.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 100, Total Editing Time: 10:28:55, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:23:03 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):93184
                                                        Entropy (8bit):5.351003521831334
                                                        Encrypted:false
                                                        SSDEEP:384:46cHcDWNkq1ED1vvdmnYGngnmJn6RsLDE/TIYDrUIMNevHA5/AXTeANq+cpAJx2h:cmD1vvdmn7gnmJn645t0
                                                        MD5:820B972D957DB3C16FBDB57EFCBD5FED
                                                        SHA1:7406A6C07D42F7F5B3FD1B6D566A7D301A25E99E
                                                        SHA-256:49DBD73C4739A9BCF13D6D41850413DD22A60E0DF1AF880BAF2598DFEC818A54
                                                        SHA-512:532EDECFDDA49275BAA849A3802B2A49156D4C0AD7E2423D1CADC81CAD132C0661F1FCBFA6173F5CE60D84D59C84C2B4159A525BE0374FBA236371D1A71DCD8F
                                                        Malicious:false
                                                        Preview:......................>.......................D...........2...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4.6........................................................................F........p...p~..p.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................;......E.m.b.e.d.d.i.n.g. .4.8........................................................................F....@...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 95, Total Editing Time: 08:04:47, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:23:32 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):81920
                                                        Entropy (8bit):5.321035397652944
                                                        Encrypted:false
                                                        SSDEEP:384:u/qIV+qqnAtr6napq/7cen2cvUV9XjQscvbWFlgMFWpoNi7abqN3NE50o8KwBv2a:fqqnAtr6nJcen2cv8
                                                        MD5:BE5B1FB3E899FABC3EB7401E12F6DAE5
                                                        SHA1:F1A260B5E17D3FDAF84544CDE55F76F117C0B34A
                                                        SHA-256:19BDDCBD575C3F844BF482ECF3ADA47DA84DFC0CB8F795E56E8657D16546078F
                                                        SHA-512:9F8E821FFD7E88450CC8C0C0B9407B763A0EFD536B6DFABA80E6053E82492E83F2836D360D918427FD0A4716CC395462F5BEB6954A15C2C660A0EE8D3A617962
                                                        Malicious:false
                                                        Preview:......................>.......................<...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4.6........................................................................F.......q.......q.................O.l.e.............................................................................................................7.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .4.8........................................................................F....P...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 98, Total Editing Time: 08:25:46, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:23:51 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):79872
                                                        Entropy (8bit):5.287604768176084
                                                        Encrypted:false
                                                        SSDEEP:384:UULRea+qwnUfPLUnihpE/Hdi17bNnnJGcI7G9R+ysRUlFtBCyAyx1dmLdJ1/UWmJ:OqwnU7UnrVS71nu8RtOO5
                                                        MD5:27085F01DE4D3142E9E4B9BB211557EF
                                                        SHA1:B2B45E3ADCB2E595633992C976C9A261AA6C6D8D
                                                        SHA-256:CA9A355143C4A90E927BEFB8BBB313DACF45E6ABC5FD8C9395AAF2A1518F1254
                                                        SHA-512:399AAB73C33F278E058B0506F9D056E99E2F39D62E73F611AF0C3E2A512647567A238F5B1DC1E2B4F0A7EDFCCE79688B130D1ACFCA154EC0E658E50ABA073AAC
                                                        Malicious:false
                                                        Preview:......................>.......................=...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.0........................................................................F....P.|.q.......q.................O.l.e.............................................................................................................4.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .5.2........................................................................F.....w..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 108, Total Editing Time: 1d+11:09:54, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:26:09 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):111586
                                                        Entropy (8bit):5.367325742316195
                                                        Encrypted:false
                                                        SSDEEP:384:jzJFVv9kfjZNPWGeQY99TnjOaLhnniomsnnnzJX556HPipVqxzeixiIAkzk2tMfH:FvmfL+jQY99Tn/hnnLnzJaN9MT
                                                        MD5:607F6373C804F27F8FDF44A67900FB2F
                                                        SHA1:3B40ECB8AB64990E950052E75D7A1839F7157705
                                                        SHA-256:7839AB6F8668346B93AD1A5FB2F6010E768F746C22746A3698A9F8CEFB2240FA
                                                        SHA-512:B70530BBD70B79E3C2A4DA844CCA9666F79F2A2CE3E07578788A0B8CED4DC65829FF1090B98739E31DA96BAE32B7F94FC982E84C266293046D0F5094ACDF6C34
                                                        Malicious:false
                                                        Preview:......................>.......................W...........S...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.3........................................................................F.........u.......u................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................XO......E.m.b.e.d.d.i.n.g. .5.5........................................................................F....p...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 100, Total Editing Time: 1d+10:02:03, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:23:06 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):96768
                                                        Entropy (8bit):5.253739160278084
                                                        Encrypted:false
                                                        SSDEEP:384:vKm+fLcKtI4w9+IZnT3vWAlrNcEBa75JL7s8+GtGP37Wufq63f4ZlUWDgnfO9U7E:Iw9+IZniArqka75JL7s8+Yi37
                                                        MD5:DCAB179D3AD3ACFD7A7233C780C4535A
                                                        SHA1:CAE2FA8660F933F310E00CE62EF0BE2EA3870873
                                                        SHA-256:3C96A70007A1F72F740E2145478000E1B5AF48EC302B90B44362316C7F6483FF
                                                        SHA-512:C3848B1E96E8C7AF5F163E0F0D182DCD86259A3DC66E90C872D82603687ED3D8C4904BE4B83D7A75242273629DDD91C7A4C6E9483291D27D7FC7A26ED8EC4D67
                                                        Malicious:false
                                                        Preview:......................>.......................H...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.2........................................................................F.......s.u..P..s.u................O.l.e.............................................................................................................6.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .5.4........................................................................F.......s
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 102, Total Editing Time: 12:46:54, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:25:56 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):97280
                                                        Entropy (8bit):5.433407303868964
                                                        Encrypted:false
                                                        SSDEEP:768:Xv8TdJn1L9e/XR1njdFKaVgSoLUW2nE0QNjNH9//SxR2OfRuBtxVet0eYxeggQYv:Xv+kRRpAooLUWoE0F9
                                                        MD5:172733484051DE3076D0A569F645045D
                                                        SHA1:8BE5BB91E53AAD1EFBACC2C54AEE07FE1C1F164A
                                                        SHA-256:E9BB1BA3289F596D025A5231320B03235BE5B816DC0F488EA01C515E4901E54E
                                                        SHA-512:1252FA1225208BFAAFF9DC65A6825B795EF0909A9998978734615FE782595B3A8A816D08393D36694D02EAA7B292A8328274681CBC4005881F0D071FA08186B8
                                                        Malicious:false
                                                        Preview:......................>.......................I...........E...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.5........................................................................F.....}.]q...@..]q.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................2.......E.m.b.e.d.d.i.n.g. .5.7........................................................................F....`..]
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 101, Total Editing Time: 10:20:22, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:26:15 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):94720
                                                        Entropy (8bit):5.272781101700666
                                                        Encrypted:false
                                                        SSDEEP:768:gNuIJnEBd9cuF8Un89429gapL8LbniyRbV:g5ETv8aNApL8LrzRbV
                                                        MD5:1B37C2A8DEC9E777B46E116BA50A3563
                                                        SHA1:A8898F875CBC592BC5E20CE53B6EF9F0BB78D7DF
                                                        SHA-256:DF084AB74DF1D8A747C1249B49E6D8D59FBF0502605F32E441B197E8E2A93242
                                                        SHA-512:189D4B233FC19C87796B2CBAA963C482E91DF34BBAB9A07EDAD432383C672FD283CB9A7E4D5A65330767F229357A460E77443E5A05DDD56209B72AD9CB444C0C
                                                        Malicious:false
                                                        Preview:......................>.......................E...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.9........................................................................F....P..iq...@A.iq.................O.l.e.............................................................................................................?.............O.l.e.P.r.e.s.0.0.0...................................................................................................T.......E.m.b.e.d.d.i.n.g. .6.1........................................................................F.....N.i
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 102, Total Editing Time: 13:13:55, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Fri Dec 17 19:22:29 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):61952
                                                        Entropy (8bit):5.197538641051164
                                                        Encrypted:false
                                                        SSDEEP:384:Hed98gAdS0dfq8n4hwlnTntEU/19uS6cEa7NyxPRkgmKAKc4IEztItr7XLXjfM:C8gAddRq8n4unTntEU/oV
                                                        MD5:36859ACF22527BC88FBFB9E37440A55F
                                                        SHA1:18AF08920D3346871C714D7BD6FA9CE15EB1ACC5
                                                        SHA-256:75FC4385FB8AD4B3D51363C5698ACB8282103660B6976247C2C2BF503D375A2E
                                                        SHA-512:29FDB57A280EAE39C3F358601885953CB80361AD30390877DD4A1CAACFE1B3921D021FEA3FF9411642FB32BDBCAC486BCA413F834046E793BD304A51449C0F5B
                                                        Malicious:false
                                                        Preview:......................>.......................5...........$...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .6.2........................................................................F....p..m....q.m.................O.l.e.............................................................................................................$.............O.l.e.P.r.e.s.0.0.0....................................................................................................*......E.m.b.e.d.d.i.n.g. .6.4........................................................................F.....,.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 101, Total Editing Time: 10:00:19, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Fri Dec 17 19:22:46 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59392
                                                        Entropy (8bit):5.168408859847519
                                                        Encrypted:false
                                                        SSDEEP:384:+wfUNpSgv0nWjVnVdffnhzK8h4pJQK68JqYVyVSheqCizxT:OpSg8nWjVnVdffnhe
                                                        MD5:97E1308BA3ADF310E6A2DB558CA9D4EE
                                                        SHA1:3FEE31C76C8A7648B9019C07D20A20352906D10E
                                                        SHA-256:4AA41550EC612F8F97BBB2FC015E81FD493DA6C463C4B6A2FE8BA1430BEB5AE9
                                                        SHA-512:2DE6880192BFE2D4B79F6FCCF0E976B573FF3E0E4468BDBDA75C73E07541ECEA6CAA1D5A2345E103DFD40E68D5C1E5F8B91BE40513879AE87AA1384B4E7F2C2C
                                                        Malicious:false
                                                        Preview:......................>.......................1...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .6.5........................................................................F....P...m....,..m.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .6.7........................................................................F.....9..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 37, Total Editing Time: 03:53:01, Last Saved Time/Date: Tue Apr 13 14:20:34 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):114962
                                                        Entropy (8bit):5.261604527673691
                                                        Encrypted:false
                                                        SSDEEP:768:I2e2hGE0kS1gDYq3nly76JfvRtncMZC03Eew:IjqDJ/cMZC03Eew
                                                        MD5:1FB07367EEE8E3F2FFA696DA778F9018
                                                        SHA1:170EF1512BB373E4EC8FBCA5263B5A08F36B9512
                                                        SHA-256:1D33DC7FF4AD1B4893E9DB4C72C5F6D8D0D86075D397B9186B2854854AB81939
                                                        SHA-512:178EC58D64CD56BC646D86F86E1ACE92425133C10B7761F5049BD2C091464EC32A570B1E2473B5D0FC011119C74266AEF41B48A12E159F2A262A2F0FD9A2ABA3
                                                        Malicious:false
                                                        Preview:......................>.......................X...........T...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 48, Total Editing Time: 05:04:50, Last Saved Time/Date: Tue Apr 13 14:21:45 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):146388
                                                        Entropy (8bit):5.235020092891038
                                                        Encrypted:false
                                                        SSDEEP:768:lHhUlBYVEpjE0l/8ygiedZ/ZXA2GGWOnxviPNisAtk71j3/NhaWVh:cisyzxviJhaWVh
                                                        MD5:47FE2ABB3C4266AA429CAAF719CF71BC
                                                        SHA1:E4C54798A9BCCF3C701159269C45D7E100260917
                                                        SHA-256:18FF6C961A1882DBD1F73D84F8FD8EC5B8C15D93216D070AB4B700D56F7D4DE7
                                                        SHA-512:2C298236AC196DFE6D63D4C39E4E61E33657B6EB532E6C8997238555B8E9D4D0114AA0765B1CD1ED8335595A41BEED6021F80A25ACA9F1CA1F5B830352468DBC
                                                        Malicious:false
                                                        Preview:......................>.......................p...........l...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 43, Total Editing Time: 04:21:42, Last Saved Time/Date: Thu Apr 8 20:48:13 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):107008
                                                        Entropy (8bit):5.203668389142667
                                                        Encrypted:false
                                                        SSDEEP:768:z/e2h2SnE0VWT+1+CiQCQGWPn32nhLn9ltYpM:XlWTQGnhL9ltYpM
                                                        MD5:EC5ED3BE771AF6005AFCAC6A4C51F499
                                                        SHA1:CA5DB43D68B152900E6F53E8E612EC8797F2A3D9
                                                        SHA-256:DF063F6FB7499AD1ED1A1119619EB53522AAE076943B44014F88D29C546256F8
                                                        SHA-512:55AE15036ADE8A92BD83E18F5BC56164E2C591E28C8F27F2DD50EBF0510B2A9F5B593FE58967EBEF7BBD2A49B515E13D66435624A8ACCCB6D4C2ADF924F8B266
                                                        Malicious:false
                                                        Preview:......................>.......................T...........P...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 51, Total Editing Time: 05:01:15, Last Saved Time/Date: Tue Apr 13 14:23:15 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):166675
                                                        Entropy (8bit):5.129449327763986
                                                        Encrypted:false
                                                        SSDEEP:768:GM4hVe2h2WE0VSAcZ7qW5xp7XnWGHP/3HcMJMkcp8sbHVrtHXGnPr9swMnvUgFKG:GjqZGW52uPr9sxDNe6pwO
                                                        MD5:304833086B629BFAF6693DA65E39EE77
                                                        SHA1:F76E35DE8ECC14B02F43CA081BCA9564401A98ED
                                                        SHA-256:7798FE0E09498A983A14564088513DCFF524A92B029E696FA7666E7D2F21CD52
                                                        SHA-512:3B7BC1572975669F1F0C6C47A4DF4F1D790010432CB1B192A878E765135383937188B7A303804C0650AB95BBF3D49CDC86F1926098830880CF1CCBA01244385F
                                                        Malicious:false
                                                        Preview:......................>...................................~....................................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedd........ddddddde.dcddddtdA..dd.gddd.dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffd.ffd.fffgfgfgfffffffffgfffffefffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf..........8....o..... ..hoooo}...;..............oooooo.s.....F..tssssS.p......ppp|9.1........pxprpppqpc{si...^ABCC7,...]:.2........s.s.....@..tssssn.p......pppy94>.....p{pepppqpc{sd...^ABCC7,...]:7=.....s.s.....J..tssssQ.p......ppp~3........>...p{qppppqpc{so...^ABCC7,..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 50, Total Editing Time: 04:33:45, Last Saved Time/Date: Tue Apr 13 14:24:17 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):107008
                                                        Entropy (8bit):5.212905544497119
                                                        Encrypted:false
                                                        SSDEEP:768:Ve2hrxPE0TNYWedi46AMWnX9KtpskNNf:lx7NmX9KtpskNNf
                                                        MD5:0EDE1C44051050AC187DA8AE1A31C2F8
                                                        SHA1:6727E18195931D9FFED15210436147C34CF1CC87
                                                        SHA-256:8D79794DCE8E8102C720728292C6F6EBFA0001110DB7AFB4E02F82F3DC59CAC5
                                                        SHA-512:AD0387D629DD90745A5566F5DBEFD2EC2F7EBAE6428AB89F0169F11D412B917359CE61DFCB47365CD0D0BFEF58DD57CB7991534B97CAED8778321480062F4842
                                                        Malicious:false
                                                        Preview:......................>.......................T...........P...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 49, Total Editing Time: 03:46:39, Last Saved Time/Date: Thu Apr 15 15:57:48 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):76800
                                                        Entropy (8bit):5.009447532664834
                                                        Encrypted:false
                                                        SSDEEP:384:TPJJ7E0hxrneCraahyLQnKwtdKqDnfpACZZkqelRmEChcbSfjSwHbSwT+4suZMs:VZE0hxrneCraah1nKwtdKqDnf6/uaT
                                                        MD5:DFF552E4E496944479F953253BBD7351
                                                        SHA1:C1B05DD86E65721096C510D61D58BD98ED6DF24A
                                                        SHA-256:F694DB14FCF41F4AB49B0E78A5BB6013F5DBB3C98FE2419A8B4F31E9EC6C01E7
                                                        SHA-512:C5C7C86701687A794F69CE62BA2283866641C2BC4DF06E81D2B82B13AFE19EE1F3DB98374CACB0BD10ECCAC55BECA350C074B53132878FF7F167B26104D8ED63
                                                        Malicious:false
                                                        Preview:......................>.......................I...........F...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.2........................................................................F....P(_.."..P(_.."................O.l.e.............................................................................................................(.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .1.4........................................................................F....@M|.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 51, Total Editing Time: 04:10:11, Last Saved Time/Date: Tue Apr 13 14:26:03 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):93184
                                                        Entropy (8bit):4.932281798856309
                                                        Encrypted:false
                                                        SSDEEP:384:my8vFCp9Baa2ei+8dnKS+Mn8ApHNbjjVkyCSiyCizjyfanlIz1c5Ok28Zfcu3HUJ:AFei+8dnXDnjN5ayCSiyCizjyfan
                                                        MD5:CA9D0B00E917E157CC2408DD4DC2EA90
                                                        SHA1:DC8EAF0340917B476C13C22392A923FC9FF2A544
                                                        SHA-256:C08686BA7C85FE2046B9CDDC4A1DD01D46D46C2380097622D01BA26C7FEE2DA0
                                                        SHA-512:17E3A6CD88BA189CB3661E5A297F208B1460B22920B3C49E2388C521694D6A9857AB388530E606F4672671934F7BF29DACD4526881A46427550EE2BCCCD59779
                                                        Malicious:false
                                                        Preview:......................>.......................X...........T...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.7........................................................................F....pn8.Z!..pn8.Z!................O.l.e.............................................................................................................".............O.l.e.P.r.e.s.0.0.0...................................................................................................H.......E.m.b.e.d.d.i.n.g. .1.9........................................................................F....0.U.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 53, Total Editing Time: 04:44:01, Last Saved Time/Date: Thu Apr 15 16:32:30 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):91648
                                                        Entropy (8bit):5.076995311538233
                                                        Encrypted:false
                                                        SSDEEP:384:IjZfGSJA38On49XQTyknFq8OgwWu1w8va5Eqbe8E7wtzwaxJbhA4zCeh5oORTJJA:IsaA38On4UnWgwWu17qbe8E7wtzLxJ
                                                        MD5:5F1D64DB7229FEF2119003A2215D06C4
                                                        SHA1:42A8A4F7B01CC3363741734F4B3191E835B745ED
                                                        SHA-256:6DC59A6992E5543D655C584C7E969C76BE1B5E56A7472A89879FD5D78F94CFD7
                                                        SHA-512:03DEBC9A70F6C3BE45DE952D959B8CD26C30DC1F08C8D1E9383C380592A2158A2209CBB9DB75275838BAB40CA6374609FA472E78EE67216168F322BA357EDBAC
                                                        Malicious:false
                                                        Preview:......................>.......................U...........Q...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.9........................................................................F....P...."..@...."................O.l.e.............................................................................................................4.............O.l.e.P.r.e.s.0.0.0...................................................................................................."......E.m.b.e.d.d.i.n.g. .2.1........................................................................F........
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 68, Total Editing Time: 06:54:28, Last Saved Time/Date: Wed Nov 3 19:31:39 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):175839
                                                        Entropy (8bit):5.344109633971589
                                                        Encrypted:false
                                                        SSDEEP:768:rrFkQq5mlq6EppSEijiV6SArIbn+6UhUHMO5us0LNH:VAvUhUsLxH
                                                        MD5:AA067548970C7B00CBD1AB3D163064DE
                                                        SHA1:E72267289B4399F1F51979382060F3A4015D95EE
                                                        SHA-256:7E38CC0B0BE481B16A64708EAB29064AAA1E7FC9603B479F3A1027C89599C443
                                                        SHA-512:F9FD3F88F52846DD922F17555AF1E390EE1FEBEF38FE4A8633AC34E1E7B60BFBCD14240FBB1A9A006C6F937453961AB5846ACB6169678DE041EEDB811A450615
                                                        Malicious:false
                                                        Preview:......................>...................................~....................................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedd........ddddddde.dcddddtdA.$dd..ddd.dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffd.ffd.fffgfgfgfffffffffgfffffbfffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf..........8....o..... ..hoooo}...\.)............oooooo.s.....?..tssssn.p......pppy3...4...p.pxpppqpc{se...^AABC,...]0...7...s.s.....E..tssssS.p......ppp|9.1........pxprpppqpc{sj...^AABC,...]:.2........s.s.....=..tsssso.p......pppx=.. ...pvpxpppqpc{sf...^AABC,...]>..#...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 64, Total Editing Time: 07:36:52, Last Saved Time/Date: Wed Nov 3 19:32:42 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):183665
                                                        Entropy (8bit):5.227388050044036
                                                        Encrypted:false
                                                        SSDEEP:768:MVSBlBnqKOBlueO+O+u7yuLZJ5p5pZQgBx4Un5pFmWfN1pmSoNZl50Qa+OOKF/RI:M0BISTEWfQSoNZl50Qa+ONdu
                                                        MD5:FBC80A0187F08266BE1BF548458C222B
                                                        SHA1:407678E96CB6077C13DD905E4773B2EF1EC765BF
                                                        SHA-256:5A5FC33AFE7368245E28A7713662C9BDA876F5AC927394A5A8A30836FE725DE5
                                                        SHA-512:11F5E8D401D6FB0172B501776B6DEF21BD11B1081B602F1AC98E8F42D114CDE9EF8EE0728E1F0D509506FCEF5D7D27296290227AF513F4950C40E4F32FCDC8E3
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e.......................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 16:11:52 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Wed Sep 29 20:57:07 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):97792
                                                        Entropy (8bit):5.235321248671491
                                                        Encrypted:false
                                                        SSDEEP:384:h3FE+JrT1W4O7jhcWvL4LRNXncMEUYAkEUANCfn/+ckPJa0ihYpkeQd9H1tiADS5:ijh7vLqRNXncMEUYAs/fn7fOpiq
                                                        MD5:343EF05BA42CEA68AF2C93D6A13D1DDA
                                                        SHA1:48696E1A874EC0D9359750ED88AB9DD120556EE6
                                                        SHA-256:1E7B03D67BDBDA7E22A68F91690B917B454A35B7797A67782DAA970E035E32BC
                                                        SHA-512:7B2135F9A204F2D06C1AF46AA7E0822ADBDD3FA7D7642B759AA46C56966E864DA2D713C36193DE51F5C7148DF0D1961ED98A14D07A798165065F60CF0478B6F0
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f_reports\2003 Forms\cro-2310.ttx..........cro-2310.ttx.............................................................0...................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Wed Sep 1 18:17:24 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Thu Sep 30 13:20:19 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):76800
                                                        Entropy (8bit):4.878667838414998
                                                        Encrypted:false
                                                        SSDEEP:384:jaLie5bHqeAsUpQZE0CoYnSmrWJKQa0CoY2SirQ8Oa0CoPp7ft7wMvWwdmhWwSY/:gx6hQA1vWg1SQ8bepLtH8h
                                                        MD5:5708195C58E3C42049C1B39A69A778CB
                                                        SHA1:A7B8E652A3719B0495FF8BD553E01518F3D3E6C5
                                                        SHA-256:7192672E01BE235F4AEE589F8C89AB98CA3937B0E578E707D2C80104EA658F3D
                                                        SHA-512:9BE7F2BEDB67C1BCB57C713FBE99483F2F59576458FFF2979BD09BB56669AC19A42A5A32B03398163BE93D7011C39C807831901CF90BEEE3A97EF754B32C0F17
                                                        Malicious:false
                                                        Preview:......................>.......................J...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................[...........E.m.b.e.d.d.i.n.g. .2.3............................................."........... ..............F....p...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Wed Sep 1 18:30:22 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Thu Sep 30 14:12:24 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):87040
                                                        Entropy (8bit):5.016829721181625
                                                        Encrypted:false
                                                        SSDEEP:384:Sf1lCrJRyG5G0aAYCMKiOqvsgyLfH0aAYxB3UoggtX20aAYpo0/6wMvWwdmhWwS6:1yGy9ygA9XEogIQ9pxM8hqO
                                                        MD5:F5CDAB6A4DF5F715194C5DB56D5BC3D7
                                                        SHA1:6C4A37A491B552AA28294D9B739CACD9738B0C0F
                                                        SHA-256:702F5AB1C9D04BE301A38CAA092D2D77E3A572DF40D08FFC11F4CF875D2E0C9B
                                                        SHA-512:E35E47012B974896F0904C276EB9BDB9587ABDD8A6891B06BDE60CC14E6D73448FBA3C6E3B536B30BDBE279D6729B2C227D626D7F058BD38C16342405B52E8E0
                                                        Malicious:false
                                                        Preview:......................>.......................V...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................t...........E.m.b.e.d.d.i.n.g. .2.3............................................."........... ..............F........
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 15:18:00 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Tue Nov 2 15:55:18 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):172330
                                                        Entropy (8bit):5.203209297538331
                                                        Encrypted:false
                                                        SSDEEP:768:ZMvUSXCbLRXY+OXLTgcbRRdUKuPkBLpYf78hhxhDhmVhShQhdh5vOG+6z:3SXCbg/gc9R6Pot9hQVQ+3h+G
                                                        MD5:63F5FF7C2D7205CB2E4D97A709C8BC33
                                                        SHA1:4E24825E5143987872329001C92F111290F14E84
                                                        SHA-256:BCD7C0FCE94BA92252B53248F5A7720E9D05EDC5B509B6F5D05640F27C07513B
                                                        SHA-512:C501643907DE3CB3F96C0B9EA6F8871DAA01DF15D6BE2951DD16E97CB346E19A55E12D58D9D2F71F703D42FEE5C8EA830D1657DFD77AF1C00907F73621ADBD84
                                                        Malicious:false
                                                        Preview:......................>.......................m...............................p...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................z...........E.m.b.e.d.d.i.n.g. .2.6............................................."........... ..............F....@o..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 43, Total Editing Time: 05:27:46, Last Saved Time/Date: Wed Nov 3 19:33:51 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):57856
                                                        Entropy (8bit):4.912226439854232
                                                        Encrypted:false
                                                        SSDEEP:384:PWFml8E2XE848Qu9rC6gpbtne38GvfPVmPZn8IYpT0QCp3MaQRbx3eCWQ:1l8E2XEwQu9rC6gvnezvfPVmPZn43
                                                        MD5:3CA49EB0F57DA94C615276F113798BBC
                                                        SHA1:BF7BC7157F202F78272F8E523A3A79064BE0F9AF
                                                        SHA-256:8D5E5F0BDA98BDD948625BD559E1E75E8D6409809A0527678156F602D7CCF44D
                                                        SHA-512:E59A06824B6B995BE87054A7A43A09CDFE033177EEB2E1C2C21465F97C2C2D96CD919202836D23FBC21AF3DCFCCD22507E725E8BD8B9843B4FE08F6B0ADBDEC3
                                                        Malicious:false
                                                        Preview:......................>.......................B...........?...................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only)....HC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2500.ttx..........cro-2500.ttx.............................................................0...................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Mon Oct 22 19:25:35 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):97280
                                                        Entropy (8bit):4.976430970520775
                                                        Encrypted:false
                                                        SSDEEP:768:B0jbfG0HYJffpgAnVY7PfsUMXHwKY0/Oxlu7cimw:0btHofHVCf/MXHwKY0/AuIi7
                                                        MD5:8EAC4565C5C68E1989A9FF7987815CB2
                                                        SHA1:0EB3FB50AEF02C35F85F65F5857A716C8AEFA682
                                                        SHA-256:9EC7029D0766167D10E4D46F032B5B108B3B31B3A3237DE100D87E77D2B51386
                                                        SHA-512:C70D33774D966A4E48970C1C3CECDF47F688603A7D50B707A61C4D8EF045C40997ED14CCE9784C08D05A2503BAAC36394E8E2BF1F137BB9CA21D646C73A27874
                                                        Malicious:false
                                                        Preview:......................>.......................b...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.............................................................!.......................................................T.h.i.s.W.o.r.k.b.o.o.k................................................."......................................................._.V.B.A._.P.R.O.J.E.C.T.................................................................................................).......E.m.b.e.d.d.i.n.g. .2.2.....................................................%... ..............F.......w
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 15:25:10 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Thu Sep 30 16:30:55 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):135680
                                                        Entropy (8bit):5.128156286632356
                                                        Encrypted:false
                                                        SSDEEP:1536:mV49P3yLKq8o4zLcb2UlUc4K+xTPNRPzUsdiallTonTIn2:1PQyN
                                                        MD5:DA29DAC0A434ABC27100A3A4A367E110
                                                        SHA1:C221D94A7BE299E5E14EBEC92A6DE9BF94480A15
                                                        SHA-256:20D3D0DD26709E180F54668AB6C3699C1868925626FC6B1423D497605E7AD68E
                                                        SHA-512:1472086D61EB119431EEFA82F285077CADAE6E242F704EE586A792E1D47FC241DDA2EE294FAF059CB172093929EBCAB6FFDFF067D1565F99DEF8C99FCB3E6C6D
                                                        Malicious:false
                                                        Preview:......................>...........................................................N...........................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................V...........E.m.b.e.d.d.i.n.g. .2.8............................................."........... ..............F.......
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: State, Name of Creating Application: Microsoft Excel, Last Printed: Thu Jun 15 19:07:57 2006, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Mon Jun 19 13:10:06 2006, Security: 0
                                                        Category:dropped
                                                        Size (bytes):163871
                                                        Entropy (8bit):5.0807907373790036
                                                        Encrypted:false
                                                        SSDEEP:3072:BaoO2BABgppv/5/vR6WOyALYaHueLJJz9nZMEaGzI096cZzl9Q:BaqBABgppv/5/vR6WOyxcZzl9Q
                                                        MD5:1305898D36FFA9B7F2588B4A1500E83A
                                                        SHA1:401DFD86A8927D1CB5E22A6AC704398721C28943
                                                        SHA-256:B1A4B2167F40F9CB5FF128CD49F194334D730ADC6C0B5C71DA91F0AEC41FB573
                                                        SHA-512:E27CE2D9EB5A541E24F690D6951AB133DB81D9BEE17AEAD2A9FE0A562007F24D522FC9A920F0687BE12BCC3CA357760319D70C077992B2885FD8DED3FE36F5A4
                                                        Malicious:false
                                                        Preview:......................>.......................................................z........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...>.......?...............................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: State, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 16 19:02:54 2006, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Fri Jun 16 19:04:24 2006, Security: 0
                                                        Category:dropped
                                                        Size (bytes):122880
                                                        Entropy (8bit):5.031239289107367
                                                        Encrypted:false
                                                        SSDEEP:768:FB9CHpBpB5GOLJTJBEb/1EMAsxv5JQUM0FKmoDd:ZApt1LdEb/nAEv5JQX0Fw5
                                                        MD5:47FFCCC46A2FC77F5FE6538F2BBDAA65
                                                        SHA1:B99466E07ACEBAECC9444EDE30769BE9DF08F5B9
                                                        SHA-256:967BEAFE2035D7AD942A8DEF6BA82D5BD8ABE196A2DF615C7C39F9E6CC27B796
                                                        SHA-512:3829104E23319091FF92652912E9AC6F7AD2812EDDC625599A8B41D4D855F619A46F61FFE797D0243FB3774F49B34C47E42D79B55AB9A53A0D650E4858766D75
                                                        Malicious:false
                                                        Preview:......................>.......................................................~...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 11, Total Editing Time: 01:13:31, Last Saved Time/Date: Thu Apr 15 16:10:09 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59392
                                                        Entropy (8bit):5.20548689364493
                                                        Encrypted:false
                                                        SSDEEP:768:Xu/JhxbQkQmhQ5NM9maf1iZxIHbWCAnBHszjGBAX1mrx7SympaenjKC:eR0kQmsMRTu9sPCQ1
                                                        MD5:F06A082EE26DC7A9FC9AF75EA78CF04B
                                                        SHA1:6FA744D6397EE27FAD957FD2E835003CE0928D2A
                                                        SHA-256:E0B846D5CA7F4D42E7801DA32552585399C441E3D3E3B7C209A1EE94603CBF2A
                                                        SHA-512:0FB7785CE7713382D67CC5FA8E41D0C7371DF9536A0E23A2FCE3A1E9DEDD6A0AEE155B2A0ED95366966CF7A71545B4476A323DCC438615C51A7E70E75DDF4AA9
                                                        Malicious:false
                                                        Preview:......................>.......................O...........L...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4..........................................................................F....0.H.."..0.H.."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .6..........................................................................F.....Mj.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 11, Total Editing Time: 59:12, Last Saved Time/Date: Thu Apr 15 16:10:40 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):58880
                                                        Entropy (8bit):5.202598797564419
                                                        Encrypted:false
                                                        SSDEEP:768:9x/p8JhxbQkQmhQ5NM9maf1iZxIHbWC8nJfBna/KEn2:9Jpe0kQmsMRTabu
                                                        MD5:F0C67D5BE0C6C23069A98FC9C42B21F0
                                                        SHA1:3664DAC584F65485BDFDD03FC215D817B9DFC30B
                                                        SHA-256:EF0E4EA896076843CCAAD02933AEDBE79482D8AA94CC7E42102E4138D665F274
                                                        SHA-512:3EE740535B59E33A29D9B8B323DEC0B96E6C8552BC38D9C9FD344D91B85AB7284052F6D5968FB2094FC262EFB2F5D80842D9C42392FF1D51BD7169A8F441F0BD
                                                        Malicious:false
                                                        Preview:......................>.......................N...........K...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .6..........................................................................F....pP..."..pP..."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .7..........................................................................F....@..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 11, Total Editing Time: 53:27, Last Saved Time/Date: Thu Apr 15 16:11:02 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59904
                                                        Entropy (8bit):5.210459280768143
                                                        Encrypted:false
                                                        SSDEEP:768:LCRojJhxbQkQmhQ5NM9maf1iZxIHbWCnnkrnCIHWnJE:LEoF0kQmsMRTP62
                                                        MD5:B511926EF1002CB1F4AAA6E2071672E3
                                                        SHA1:3C1D20F9223C2CE424D6B906D9789C493576EC55
                                                        SHA-256:4F495EC0387E14EE0F211F0A53C133D0362A75DFAD14315A9DAB42A7E6D7F6A0
                                                        SHA-512:1958C9CFE296090A6407AB032CC2E160982942AAB6A5B1CDB466547E6503A612632764471AB7EC80546F960C7CB2E69C115CD7B82FEA90ED0D58BEB818BBD8E3
                                                        Malicious:false
                                                        Preview:......................>.......................P...........M...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .8..........................................................................F....pO..."..pO..."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.0........................................................................F.... ...
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 14, Total Editing Time: 47:00, Last Saved Time/Date: Thu Apr 15 16:11:40 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):60928
                                                        Entropy (8bit):5.198727350702287
                                                        Encrypted:false
                                                        SSDEEP:768:DQ+bXJhxbQkQmhQ5NM9maf1iZxIHbWCsnThHnRKqn8:DZb50kQmsMRTa9P
                                                        MD5:F3E96121EF1FE4575C5112E52619A9DA
                                                        SHA1:A308DD12F2DB9F5863631ABFBE97554C76E32C9C
                                                        SHA-256:742D520C233C61433A794AB11DB5FBCD236565CFC63A82D2715241BABDEF4041
                                                        SHA-512:94935A8F87744BBA7FEBCC8A5FEA0F3273CB558D7A385ABBB9CEA94DECD2BC247BB934D472D4136FB431C58956355D7DF9252A849D9731F0C546345C056EB6B2
                                                        Malicious:false
                                                        Preview:......................>.......................R...........O...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .9..........................................................................F......+.."....+.."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.1........................................................................F....@tO.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 15, Total Editing Time: 01:14:19, Last Saved Time/Date: Thu Apr 15 16:46:43 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):64512
                                                        Entropy (8bit):5.0872204368180025
                                                        Encrypted:false
                                                        SSDEEP:1536:KCrycGESg0kQmsMRTiGlrfSBaEEP4VpAH9fxFS:d0kQm9RT
                                                        MD5:E6DBE6558E05030B529A9F71B1944DE0
                                                        SHA1:EBB835D973C152D757845AD9E4EDE7A2DE5D4CB1
                                                        SHA-256:C52F450DFAD410C2C177A91DB8C070BF63D3068A52C81092AE60D66AFE88F0A3
                                                        SHA-512:49D6612314178EE866503856AE3E3079C858CA4375F827505BD40423429C120AA388C0CAFA63C4FFE7B36A81BF804AFEB87CDD8739E8F3BAF1E5FDDB533D29D2
                                                        Malicious:false
                                                        Preview:......................>.......................]...........;...............:...................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.2........................................................................F....._#..#..._#..#................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.4........................................................................F....@gN.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 17, Total Editing Time: 01:43:07, Last Saved Time/Date: Thu Apr 15 16:13:09 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):88064
                                                        Entropy (8bit):5.388710930708643
                                                        Encrypted:false
                                                        SSDEEP:768:+nVHYhxbQkQmhQ5NM9maf1iZxIHbWCFnjDnaUoqrnc94RHexedO:+i0kQmsMRTJPjpHA
                                                        MD5:5A6E41E293A03AEBC93266499DA11B7C
                                                        SHA1:6400957B493FED5E571912DB972EBABA94636FF5
                                                        SHA-256:646174976696BE16DE2AE3D451EF356F83D4DE085329301AC5295F7C61342A4F
                                                        SHA-512:1E0159E6EBAAFA8AD8BFC8FA7F000B813DC836A344B6112BCA751D0246196F5D9A0FC094842BFB53FD836CC9B7543FFC23656585E1F00BD09A79CAF4B0A6B84B
                                                        Malicious:false
                                                        Preview:......................>.......................c...........=...................]...............................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.3........................................................................F.....S>)."...S>)."................O.l.e.............................................................................................................7.............O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.4........................................................................F....P.b)
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 55, Total Editing Time: 02:10:00, Last Saved Time/Date: Thu Apr 15 16:46:51 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):158208
                                                        Entropy (8bit):5.340858554251574
                                                        Encrypted:false
                                                        SSDEEP:1536:oNe2HASmU0kQmsMRTXTcDCrycGES5orfSBaEE2pAH9fxWK0mU0kQmsMRTg:F+0kQm9RTY0kQm9RT
                                                        MD5:0393A9F38F3AD7C4A34189358C9754F8
                                                        SHA1:8622DE3DB6B32284333F4A63BD90B3F8F962CD31
                                                        SHA-256:93B0F789471FEF00B74DD158933D1E8F9C5AE045183F89910C9472E91E66DA50
                                                        SHA-512:9322F7A00928E023CE9C9EEC6CD94F338F7661AC2AB2A59BC71DC5B329A873817ABE91CA5788C2B1A6D2966B75DE76588FD57B3EFFC1C5378377DCDE6CD92C56
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only)....MC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\crystal version\cro-3500.ttx..........cro-3500.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....RC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\crystal version\cro-3500-main.ttx..........cro-3500-main.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....QC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\crystal version\cro-3500-add.ttx..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 13, Total Editing Time: 41:36, Last Saved Time/Date: Thu Apr 15 16:13:59 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):60416
                                                        Entropy (8bit):5.20599462556192
                                                        Encrypted:false
                                                        SSDEEP:768:wTlmibYhxbQkQmhQ5NM9maf1iZxIHbWCjnH1I6nd6NbqnQF:glmiU0kQmsMRTLVSM
                                                        MD5:9E7D6F992148FC5550D5DEA0932E7F24
                                                        SHA1:EBA62B123B5CA75C49DC41FE142BF5589E88C2A8
                                                        SHA-256:C09556C17C14E2286977FFB12BE987425EEE0803D607D7446057B55620A2F9D3
                                                        SHA-512:F8B0EA0B0AFE0125E3662C5FF2145F0A25348FD0F8051E010ED7527AB3BA6AC47FF3207281340E73B47644DE3725C040BF2DADCC506C61DBD32AB1FF31F0E66D
                                                        Malicious:false
                                                        Preview:......................>.......................Q...........N...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .8..........................................................................F.......G.".....G."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.0........................................................................F.......G
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 16, Total Editing Time: 01:16:19, Last Saved Time/Date: Thu Apr 15 16:14:26 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59904
                                                        Entropy (8bit):5.201214682908714
                                                        Encrypted:false
                                                        SSDEEP:768:Mm80tYhxbQkQmhQ5NM9maf1iZxIHbWCInu+lnxhvnK:M5020kQmsMRT2hj
                                                        MD5:AA8902D4CD33C667E28AE4BB9A6CADE1
                                                        SHA1:334D99391F65F36D54A444DAFC31572766E66039
                                                        SHA-256:ED8FDE84B287084F0C961C7198ADAEEA4024DDB69A6613B893E0A3AF160A10EA
                                                        SHA-512:1503E493ED48ED1132A7B3001CC7CB15AEB1F553C14163355A7529285393495C464325EC0EB9EE0D1E313C1B8B7573D7022838B301BD3865B443764EC6C241BB
                                                        Malicious:false
                                                        Preview:......................>.......................P...........M...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.0........................................................................F......\W."....\W."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.2........................................................................F......W
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 16, Total Editing Time: 55:25, Last Saved Time/Date: Thu Apr 15 16:08:54 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):64512
                                                        Entropy (8bit):5.222279462324983
                                                        Encrypted:false
                                                        SSDEEP:768:3QvYhxbQkQmhQ5NM9maf1iZxIHbWCLnWnJ8nOvuquin:3r0kQmsMRTDWn8sak
                                                        MD5:881CE3142335B809B9C88D3BAF0F1AC5
                                                        SHA1:54316525510D401A686BA152A69E658C74F73481
                                                        SHA-256:373BA0BB70D83F47E9F15967318379C42FC4FCDA8C1FF8CD3F7EE4AF47DBF6B7
                                                        SHA-512:6F3C6088109D4FE2331A0DDC5A23B4894D0A9709209B042934794CAF72C05FC79187407D199476D7DD5BBABC2D95834097F194BAD3FCC8A211EF9F1B76C8AB14
                                                        Malicious:false
                                                        Preview:......................>.......................Y...........V...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.1........................................................................F........."......."................O.l.e............................................................................................................. .............O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.3........................................................................F........
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Wed Jul 23 21:08:46 2003, Create Time/Date: Tue Mar 18 18:48:23 2003, Last Saved Time/Date: Wed Sep 29 16:09:05 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):160055
                                                        Entropy (8bit):5.274194490059007
                                                        Encrypted:false
                                                        SSDEEP:1536:LXM5UzLaFCbFD8UlI7wLS4s63a2EPo5FGyy:LXMiLaEbFD8UlI7wLS4s62
                                                        MD5:37EB610A634C1DDFC81FFB4990591935
                                                        SHA1:84E81DAED249A25AA2AEB41F15B57DE8867CC93C
                                                        SHA-256:5D15551981C1099F202823541E981A577372E458BA345752B9B3B0E0E0E2D059
                                                        SHA-512:72DCAA38E5BA795C56F2E5076064BCD683570FBC8ED4DBA83E88CFEC04AD7B30DBA6A78D7D92F8B8AC16BC5671E0D4359D1AEC1500CEC29D99EF68EAD158C17D
                                                        Malicious:false
                                                        Preview:......................>.......................................................g........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...............................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: programmer, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Mon Mar 8 13:36:18 2004, Create Time/Date: Tue Mar 25 14:52:47 2003, Last Saved Time/Date: Wed Sep 29 17:55:29 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):143872
                                                        Entropy (8bit):4.929485413721053
                                                        Encrypted:false
                                                        SSDEEP:3072:/im9jlbEsrtvnwTDCI/dIj8yI5Fik6ulE69OsccKy5:
                                                        MD5:4B55DAB27519155A12B873F1D7D44498
                                                        SHA1:8B9BE194A8DAAECAD472660DB008326326A1C63B
                                                        SHA-256:87BC25D6D57B23CE6CA2E6DB3E7FAB777FA5DE415B7347723EDBA7BF7FA43ED6
                                                        SHA-512:F66495BD44022833DE875DC3788E45CED74D595A8099EB2938B6D2BD2B15DE156FD20557991E946D0CC17D14050A583E7AA3AEF823469C4BAFB805386069431B
                                                        Malicious:false
                                                        Preview:......................>.......................................................Q.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 16 15:54:41 2003, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Wed Sep 29 17:56:45 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):145920
                                                        Entropy (8bit):4.9925301432159035
                                                        Encrypted:false
                                                        SSDEEP:1536:wHgr56AinkrRcycDCTCQd4iNbBm5+q+zG2F:wHc6AinkrRcycDCTCQd4iNbEN2F
                                                        MD5:FC038A5D0FD1B115F67ABE16A2B997EE
                                                        SHA1:F385AC3E5FBD3C5C7E463EA55714797FBA3D3FC1
                                                        SHA-256:B4E8D00C75260301D54369D88E0EEEEF0D83FD4FB7D8D845D927738453497CD6
                                                        SHA-512:85F600ABC3EFB7D782396F347F3CB8F723FCE58671002D75E769714387C7D0E35F456DE32FE5F1DCBA271F4E6780A6E8C64F922EAA884D0D5DE77965FA638DE4
                                                        Malicious:false
                                                        Preview:......................>.......................................................m...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: programmer, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 3 14:49:58 2003, Create Time/Date: Tue Mar 25 14:35:37 2003, Last Saved Time/Date: Wed Sep 29 18:00:44 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):109056
                                                        Entropy (8bit):4.763335759409982
                                                        Encrypted:false
                                                        SSDEEP:768:xnbQqAqLbqr/Su9ySWOQLISXQv+ZN5Zxftt/LIEKjGn:txgLD9yNqSf5ZxV6EKj4
                                                        MD5:65F9BEB9749339F9E44355A5C809AD4B
                                                        SHA1:C9F242F2C6E3361F1ECB802984059CD7C911992C
                                                        SHA-256:B4D9FCAE9C80A489BB0070B090F924B7B21DFAB7ECF45D06C8998287CB1082E3
                                                        SHA-512:9CF7CEB35B63CBA41C3F3EB0C9104D82729531D9426BB8A27536F594CD96A690D4B05C3029A1A7021D417591475E7A8DA5BFA713E53438122A3738D0858CF39D
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only)....RD:\DEV\CR Code\Remote Filing App\Version 2004\CF_Remote\reports\2002\cro-4110.ttx..........cro-4110.ttx.............................................................0.........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Mon Mar 8 13:38:49 2004, Create Time/Date: Tue Mar 18 18:49:06 2003, Last Saved Time/Date: Wed Sep 29 18:02:28 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):156017
                                                        Entropy (8bit):5.153834479799729
                                                        Encrypted:false
                                                        SSDEEP:768:R997ilTTQnZqWBCtvOL1HuQL3psNw8I7e+8xiZJSSZJTLenAjM:1fnUd8H0wt7pvLQqM
                                                        MD5:85D19DDF6412ADC30E4582B09B12C81D
                                                        SHA1:2A9E3E70365EDD7E63AF98CC928B1861AF149334
                                                        SHA-256:0D4EA12E2607E86CC5C7F1052832331678005D9E8A64C818BF4D9BF2E131A71B
                                                        SHA-512:2A8A070AD593871890BCF825836AF861F5CD6371C832B406E456F5B35D524E85D27DF5E7B4DA90998BFC890068D79252A353CE98AA3660E8E35FA405227250AA
                                                        Malicious:false
                                                        Preview:......................>.......................................................A...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.........................................................#...%...........................................B...........T.h.i.s.W.o.r.k.b.o.o.k.................................................&...........................................2..........._.V.B.A._.P.R.O.J.E.C.T.................................................................................................`.......E.m.b.e.d.d.i.n.g. .2.1.....................................................(..................F.....(
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 4.10, Code page: 1252, Title: Media Complaint, Author: CRO, Template: Normal.dot, Last Saved By: programmer, Revision Number: 4, Name of Creating Application: Microsoft Word 9.0, Total Editing Time: 39:00, Last Printed: Mon Feb 11 16:23:00 2002, Create Time/Date: Mon Feb 11 14:32:00 2002, Last Saved Time/Date: Mon Feb 11 16:23:00 2002, Number of Pages: 1, Number of Words: 121, Number of Characters: 694, Security: 0
                                                        Category:dropped
                                                        Size (bytes):77312
                                                        Entropy (8bit):5.1864279109289395
                                                        Encrypted:false
                                                        SSDEEP:768:WvRwuJIBchkLEFbzOew7A6irPH9Y2ZVwCFgDv6FoYsHSb:W4BA2SLpzj
                                                        MD5:46278C5B8F40632A170C005DA9D59E16
                                                        SHA1:3FF09C3EA468C6DDEAA8B70E780C1C23987A4B9C
                                                        SHA-256:50D66013ADAEEC5730A46ADB656C69CE53CBA22AC905D6939198ABCD56E6190D
                                                        SHA-512:12E5C6A70A0001AF370D1A82F8931E9F4F1CCD8728C3A7BB67F6D80E8247BCB5272D2C2C2A316D9C7A2C11125A3D747C2B2C0BC2B9895E58B772820A1C0D8B7B
                                                        Malicious:false
                                                        Preview:......................>.......................................................c...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.a.v.e.d.R.e.c.o.r.d.s.S.t.r.e.a.m. .3.4.l.........................................................................>...........R.e.p.o.r.t.P.a.r.a.m.e.t.e.r.s.S.t.r.e.a.m. .0.l...............4...................................................l...H.......A.n.a.l.y.s.i.s.G.r.i.d.s.S.t.r.e.a.m. .3.5.l...................0...................................................n...........V.i.e.w.I.n.f.o.r.m.a.t.i.o.n.S.t.r.e.a.m. .0.l.................2.......................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 16, Total Editing Time: 01:19:16, Last Saved Time/Date: Thu Apr 15 16:15:03 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):90112
                                                        Entropy (8bit):5.462546839098408
                                                        Encrypted:false
                                                        SSDEEP:768:+nYhxbQkQmhQ5NM9maf1iZxIHbWCc+nBn3IP3r8anGFfti:J0kQmsMRTNNMek
                                                        MD5:3250FC4FD11C15C54822054C28780B01
                                                        SHA1:215184E6327FE1AC1D273BADCCED85E782923AD9
                                                        SHA-256:1E7672885014E6B7C146889E2220D70D08901E7C49208B651DD234936AB2A544
                                                        SHA-512:4F73F3CF649EFCA18472C01B431646327F69DE1F5048427471344041BE5A721AE505A9B544BCA1DD1D9616EB098FA0DC1299C1652691AE217F5FFE9FA6CE69A7
                                                        Malicious:false
                                                        Preview:......................>.......................R...........N...................Z...............................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.2........................................................................F.....>lm."...>lm."................O.l.e.............................................................................................................2.............O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.4........................................................................F....`=.m
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 19, Total Editing Time: 01:29:13, Last Saved Time/Date: Thu Apr 15 16:35:31 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):46080
                                                        Entropy (8bit):5.043756431144704
                                                        Encrypted:false
                                                        SSDEEP:384:7VOicAD99Eq1HqIbOqWLgBe5lnq+jJqa+k9OdV9d:B9hD99CISbgBon
                                                        MD5:26D7904E98C4826EC8C737C66BDCBC12
                                                        SHA1:7CA4829A3E5F1BBFEDA5E3AEFBC156C39874DA4E
                                                        SHA-256:8C347894CA7949613D31E39D033063A1AF4CF3FE757333C4F1BE2579CF920473
                                                        SHA-512:F1B514950453EA4F92BC5103E0138A23ED6354780A4D29DE127A0E6056C888C320E248B1E2126013271BBC844D0DA8A20E84AD8E9BF757F5B36F75743C552E8B
                                                        Malicious:false
                                                        Preview:......................>.......................4...........1...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.3........................................................................F......I."....I."................O.l.e.............................................................................................................&.............O.l.e.P.r.e.s.0.0.0...................................................................................................l.......E.m.b.e.d.d.i.n.g. .1.2........................................................................F.....8.I
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 21, Total Editing Time: 01:30:00, Last Saved Time/Date: Thu Apr 15 16:16:31 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):30720
                                                        Entropy (8bit):5.045260314109269
                                                        Encrypted:false
                                                        SSDEEP:192:tL7OOnPkQ0hIdHb5xjvNOJMHCdrx38bW/9sn0A/qmDSAmeCDtF2MjTDIRzDwOaUe:tfOEB7n0tPRjTDJxUe8U5Ba2EBnUU
                                                        MD5:452A7EB0E5D50CCA95CD8005C00F58B6
                                                        SHA1:D28E656B06ED04270698665896266CED2D8864B2
                                                        SHA-256:E9B38C68D490F2CDA0F40BBD13DCEFDB49E20954704AEBE1111068C97ECFBBB3
                                                        SHA-512:3078578BC5CBA6866B27E0D8B4B63818D5A776867BD36859AE50B1D78EAED6EE45D68BC1D8FE2B7A12304E04977E53B30A5425409144293DA1FFF93969C2DF27
                                                        Malicious:false
                                                        Preview:......................>......................."...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.4........................................................................F.....*.."...*.."................O.l.e.............................................................................................................".............O.l.e.P.r.e.s.0.0.0...................................................................................................n.......E.m.b.e.d.d.i.n.g. .1.3........................................................................F........
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 22, Total Editing Time: 01:42:27, Last Saved Time/Date: Thu Apr 15 16:17:09 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):261632
                                                        Entropy (8bit):1.9491111808148631
                                                        Encrypted:false
                                                        SSDEEP:384:/meSOY8bNrkn5G4LLHPI7AroarCIC7eVl5nnm3PVbWkPTf:umkn5vnHoADnncPZ
                                                        MD5:2BDAB01E7B8095BB8FDEBE7AF3926965
                                                        SHA1:BA9DEB25822C3E374CC2B2E07FE661F4E9502282
                                                        SHA-256:34B8F59F480FCAF32C09E1B8427FAF5E0CF80DC39918B8E1BBF0DAE220B9B386
                                                        SHA-512:7D00C4F622E969B22416AD3C2C5C7A768CD3D95E61109DA061FACD98F7BBD43AA5EE0CA7C600F2FF7B26201ED341187F2DE4C7E2A587ACE2AE1458978F89022C
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.5........................................................................F......r.."....r.."................O.l.e.............................................................................................................#.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .1.6........................................................................F........
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Oct 15 14:21:07 2010, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Mon Feb 14 13:42:12 2011, Security: 0
                                                        Category:dropped
                                                        Size (bytes):607232
                                                        Entropy (8bit):5.407342130384767
                                                        Encrypted:false
                                                        SSDEEP:6144:DPJo8DExbYmh3gZ+RwPONXoRjDhIcp0fDlavx+W/WEjGSZ+RwPONXoRjDhIcp0fe:DPJo8DExbuG6GA0
                                                        MD5:B54AEDB3AEEA8EDEF964AB865229C237
                                                        SHA1:D4037247E61D6ECE36F3534F38427E3F59B8B9B2
                                                        SHA-256:9E3BC47402EFBF6F9E1217D2353B4ED2D633E4E0B889A8A14C4D1A2A5F48A67E
                                                        SHA-512:99842D7DAFEB366E76004A6B5306ECCF6EC9AC92E76782F12B94DA6C37EE3552522DA3CE7B1381686B44BA210785959949AB0B2D363D2282F27E2906821C2B2D
                                                        Malicious:false
                                                        Preview:......................>.......................d.......................................}...\...[...Z...f.......o.................................................................................................................................................................................................................................................................................................................................................................................................................C.o.m.p.O.b.j.....................................................................................................~...r.........O.l.e.P.r.e.s.0.0.0...................................................................................................l ......S.u.b.d.o.c.u.m.e.n.t. .5.5.............................................@..............................:......:...............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Oct 16 21:17:12 2007, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Mon Oct 22 19:28:02 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):625664
                                                        Entropy (8bit):4.950657383336972
                                                        Encrypted:false
                                                        SSDEEP:3072:TQrFH2RZraHzLWTkjqEMONv9tKAd0oNhzwcAS66emLo4cOfpkcUd3MDwC6SaHfs5:TmqHeuZgz+OSXG/inxkDo
                                                        MD5:740F31D396DCEF3D05BDED7BD483AFB1
                                                        SHA1:F8F66D67B56C7033DEB75E51521F5A447AD34996
                                                        SHA-256:FBED39F9C33EB26E82A9C20B6F90DE125D74D8168E596CD3D40D00ED7998CAB8
                                                        SHA-512:7F4E86B98968760E6E7DF03FF65E4BDF99B961FB3768C7DB49DA5796302D6F711C3CAB22733FB2B20F84F9222F33E6B849BD6AABE51AB574954A34DC50E9C57A
                                                        Malicious:false
                                                        Preview:......................>...............................................................c.......~...............h...............................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.5.......................................................3...5...........................................|...:.......T.h.i.s.W.o.r.k.b.o.o.k.................................................6...........................................l..........._.V.B.A._.P.R.O.J.E.C.T.............................................................................................>...O.......S.u.b.d.o.c.u.m.e.n.t. .6.8.................................................:...........................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 77, Total Editing Time: 03:30:42, Last Saved Time/Date: Tue Feb 15 18:26:50 2011, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):488448
                                                        Entropy (8bit):5.4462079439186635
                                                        Encrypted:false
                                                        SSDEEP:3072:dH3+Wiq7/cnF9G6Hlx/6uGUZdle9R/R1f4qzta896JboUEednkO8X7W:0rG6nSaZHQ4qJa896GsnkZ
                                                        MD5:7AC4C6D7C7069B28B2EB439657BA0494
                                                        SHA1:992D6D9DB36178139DBA882992E2D7ED9C175592
                                                        SHA-256:87046ECB5B9DE39287DFDA261139352FAF81E8CF6A37FDF964A20BD9616FE732
                                                        SHA-512:9716FC62672228B374FB537C8B02621DFAB592A2E8D757A474E001AF154214D1424A5AD9D1BFF70D77862F1F3BC4F681CF4B56DCA388E30B71809915BE0AD2BE
                                                        Malicious:false
                                                        Preview:......................>...............................................................................q.........................................................................................................................................................................................................................................................................................................................................................................................................................C.o.m.p.O.b.j.....................................................................................................D...r.........O.l.e.P.r.e.s.0.0.0...................................................................................................dB......S.u.b.d.o.c.u.m.e.n.t. .5............................................................................`..=....`..=...............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Wed Apr 29 22:15:36 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):192512
                                                        Entropy (8bit):5.007944223673486
                                                        Encrypted:false
                                                        SSDEEP:1536:RktWZ7Ut5HHsDYP8my+MXHwKY0/abtfiYIiVSfaSfV:r45HHsDSMXHwKY0/JtF
                                                        MD5:A7F2BE0A9C76BEC9C49EB1373D5090D4
                                                        SHA1:7369379F50FC341D466CC8A2B28EEDB854AB8C64
                                                        SHA-256:FAA0526CA53536BEB1316741D680356DC81479982B2250C8798D0E6F91FD896E
                                                        SHA-512:05AD1783BD4A2EE920C335CF2AB392C9DB856F15DA13EE7C509F59DB44900B17E93C901A862C540D6267CC75E322989D1C852F661D4E7BE2135D350DBC935EAE
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................V...........S.u.b.d.o.c.u.m.e.n.t. .6.2.................................................!...................................................C.o.n.t.e.n.t.s.........................................................#...............................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:34:40 2007, Create Time/Date: Tue Mar 18 18:36:59 2003, Last Saved Time/Date: Wed Dec 19 20:19:48 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):4794368
                                                        Entropy (8bit):5.157456740228194
                                                        Encrypted:false
                                                        SSDEEP:12288:m9v/Mkrk2keuK63GyEhFKT8Y6IOm8XqQEJj+8fZvR7S/z0Ie2tXK:m98GyR6NKSLt6
                                                        MD5:544DA1BE09475C44146130A8FCB9B3BE
                                                        SHA1:4513DFA718004166D674C9E6573FBBAF9C186B70
                                                        SHA-256:09A127F8DD521F7E1D029B922EA63CB1BD6C75BFF74025C78758500DB481320D
                                                        SHA-512:3DCC434E59EEFA896DBC4BDC97E13D06A4757804BB8EA04F17F7EEA86DB6B5F6C31E1C94867C177A4E84B4756A66678D93F54D4AC2126AFF42B24ED49504D95E
                                                        Malicious:false
                                                        Preview:......................>...................J...[#..............f...............Y...........2...........................).......v...........t.......................!.......S...........................P...|...~...1...2...............M ..O ..............w..."...{...........v.......x.......z...y...............{.../.......}.......: ..K.......F...4....!...!..."..]#...#..U...............................................................................................................................................S.h.e.e.t.3.5.......................................................3...5...............................................A.......T.h.i.s.W.o.r.k.b.o.o.k.................................................6......................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................X...O.......S.u.b.d.o.c.u.m.e.n.t. .3.7.7................................... ...........:.......................P<d.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Wed Apr 29 22:15:36 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):188416
                                                        Entropy (8bit):5.010132586463127
                                                        Encrypted:false
                                                        SSDEEP:1536:OO5mMgUei51+DbPc4MIwMXHwKY0/mbtPVYI9cSfaSfJ:ATi51+DanMXHwKY0/C3F
                                                        MD5:A4F078FF359ADA243E48087C2CF00052
                                                        SHA1:5E12458C8146DD365637A89B5B21930E48C108B2
                                                        SHA-256:861FE0412A7C7BDBC203F4C8E70959F03DF97949DAD70E725CCD6B193E972A48
                                                        SHA-512:250DF78987D7DCC9CD13B17EC00CA67AE5AE23FF0356F7D9096C9F948CEDB1EB334E818BEC3B3E945A5A6F575EDAF7EB42CD3FC2072F043B0797C6B0EAED6499
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.5...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................V..._.......S.u.b.d.o.c.u.m.e.n.t. .5.5.............................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Sep 29 22:25:01 2008, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Tue Sep 30 17:11:16 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):277199
                                                        Entropy (8bit):4.955204919765509
                                                        Encrypted:false
                                                        SSDEEP:3072:A83b1ABghpv/5/vR6xyPk3kHgC6tgd9bA3wOsWU7YoWIGLtXqSEB6Wrp9RdrW+Z+:AQABghpv/5/vR6xyPk3kj8fZvRwY
                                                        MD5:C1C49AEF91B5BD6B09A0D16DE5B5A1A8
                                                        SHA1:3BCEAFC0D57E4806D853E5CAFBDF83C58D9AD543
                                                        SHA-256:68F186EB404BB675258B7A37F436EF8CAE0CE0C99CE99A3E7405AD73014FC213
                                                        SHA-512:1DAD02580762635B05900A44F272F64AC084EEB913B904B9BA69A44E56A116D92B6E73EF4E1A2495441D1D1F6E6678DAA584B1D07116F2BAE0F04A7C3A83AD1A
                                                        Malicious:false
                                                        Preview:......................>....................................................... .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:09:59 2007, Create Time/Date: Tue Mar 18 18:32:55 2003, Last Saved Time/Date: Wed Dec 19 19:22:20 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):115712
                                                        Entropy (8bit):4.729959959151051
                                                        Encrypted:false
                                                        SSDEEP:1536:yYQlKGozYa7z986/yv/C/vABgvp5RhnJvq:yYQlKGozYa7z9byv/C/vABgvp5RhnJv
                                                        MD5:6106AD996499E23B00951728597CCFA9
                                                        SHA1:2A0925E3FA17D899BEACA18C7FDA025CFC23594E
                                                        SHA-256:39165D6F20199D558C3DD18966B64523636C0C9ADA65C4A1BA3A4E8DB9999B61
                                                        SHA-512:6AC84F98E24B1BAF384BDAA7B7DB12BA7B427E895FD1B81EB2B8902820E606227FEC837BB0C2C3519E94F12B16D6E5601FD1EC89235C28CE024CE3C6EE6D361D
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Wed Sep 24 18:58:40 2008, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Wed Oct 8 17:43:19 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):179642
                                                        Entropy (8bit):5.166216624571424
                                                        Encrypted:false
                                                        SSDEEP:768:/pwcx63BOdZ8FNq+cqbVozkajO32K9E9vjwWR9OqQHuqXhoOunwXyRZL7W:6cx/dqFNEqhoA3XwvAF6xnwiRxW
                                                        MD5:62F7E5138E3377191BA9809FD25E3052
                                                        SHA1:AA896EECBB096365E52FC60D1D971EDCE8C45D73
                                                        SHA-256:27BE3E35FBDED425853F321AA82115B85D4E9D03BDA9986F58ED78D174AE3259
                                                        SHA-512:D015AE587566DDB0520C47021684C3F1B373B3A9647445F937B60A6BF1175A22DF4BF41E35CB140999BB58BEAF33D627589F3755AFB84FD04408407EEDE251BE
                                                        Malicious:false
                                                        Preview:......................>.......................................................k........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...%.......&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...].......................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:37:09 2007, Create Time/Date: Wed Mar 19 14:57:07 2003, Last Saved Time/Date: Mon Oct 22 14:25:42 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):182784
                                                        Entropy (8bit):4.952399645110275
                                                        Encrypted:false
                                                        SSDEEP:3072:TXrzxidmGZKpR/V1Z2gnM815Usm8oPKcz4JyKYFf4XgQLtIyumEk/np0aVfUOBGW:5SkIDk6Fk
                                                        MD5:D4132237EB41C001172379B0CFBD2716
                                                        SHA1:F650B72162CFE3C41FBC3BB060A1F7A61025E922
                                                        SHA-256:B639182A4F1DD0297405DB3123413041F130C8358545AEBB8346132FEC5FBE1C
                                                        SHA-512:4027D8DD1303EB2A2BF0274F4D62AA38553B2C2520F448BDCA49B0B84DB5E4CD80A5BC172E2FB77EEC0F6B47BFC3E24BD056EDA5154B5D6FCFC04030F40CB26D
                                                        Malicious:false
                                                        Preview:......................>.......................................................n...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:08:58 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Mon Oct 22 14:29:10 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):185201
                                                        Entropy (8bit):5.240949811968868
                                                        Encrypted:false
                                                        SSDEEP:3072:lZ4aXxE0IeiZAqCfBFANfkF/CamYMfXFpAaZ5mSAAmTvC8s7GopsOG+8F/I:a
                                                        MD5:CDDFB8A098D01B326568A8934542E6FD
                                                        SHA1:810056460BCD69778469E80499B1B8A5ABF10689
                                                        SHA-256:23EFA47355AC238926FDD2F156959CB828F3B56F233B32B6191E590620D845DF
                                                        SHA-512:17F5AAAB78AD19DA3B44260E3142E928558C1C28BD30DC0357D2E841072BC88AE9ADC08C0479F7D14C79190A4EDA814FE81D8DDD4AA802B1A77BCEAFD60675DE
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...[.......\...]...^..._...`...a...b...c...d...e...f...g...h...........................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Jan 3 14:48:09 2008, Create Time/Date: Tue Mar 18 18:37:23 2003, Last Saved Time/Date: Thu Jan 3 14:48:33 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):168448
                                                        Entropy (8bit):5.202527529762482
                                                        Encrypted:false
                                                        SSDEEP:3072:6urIsxEywEw+001sKJY0yNnQiawtVanTTWukckYPSKjggF0M61LIiOIE1zeG9GXn:+yp3
                                                        MD5:921173462DF6CC5BE5AA6E7F1C9F19D0
                                                        SHA1:64A7090A11E0DED04E3F13AA70C0AED377DB0EDF
                                                        SHA-256:CCF9CC5D1E823E08443BE7ADCD00B20B2975B694226DE83CE4D66F8A2E7F985B
                                                        SHA-512:BBF4A1E7380D727BA46223032CBBB8FEAB208C08291DCF5C588F205628FEC74672EFA2A61A03B9EE302E02811245C1A335D2D3E2D5A29E47EA6D2270AB519BC3
                                                        Malicious:false
                                                        Preview:......................>.......................................................H...[...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Apr 13 20:48:40 2007, Create Time/Date: Tue Mar 18 18:36:01 2003, Last Saved Time/Date: Mon Oct 22 14:45:49 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):150016
                                                        Entropy (8bit):5.205596829097363
                                                        Encrypted:false
                                                        SSDEEP:1536:2W6NZmGBWou83Gngj6uPMzsWT3fki8oaKo/M4iTuRR:2W6NZmGBWoBGngj6uPMzxB8oaKo/M
                                                        MD5:A088F0800E0E423C554231B891E59390
                                                        SHA1:C345820606D84BB6529876F4F02D82C25DE22707
                                                        SHA-256:C7AB5E1C7436A1A4C405A77975716247FB177B19AF52DD58E8275B68A524E3B9
                                                        SHA-512:CE0D4E040DC1426274E2BC96CC3F997866EEE53E8A6CF8E77246E38E9C2D537A32FBC2190657667E047994DA39A0033F75D2ADFE9BA1A29881B40D1DDDF98882
                                                        Malicious:false
                                                        Preview:......................>.......................w...............................y...H...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:12:11 2007, Create Time/Date: Tue Mar 18 18:36:29 2003, Last Saved Time/Date: Mon Oct 22 14:51:19 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):206658
                                                        Entropy (8bit):5.156970374644571
                                                        Encrypted:false
                                                        SSDEEP:3072:gMPxdYIMwBzRn3Y5LoGMicjtGTD8x/0LUdheW/zXni8yV5Gr920W8y8a50032gSs:EKhK
                                                        MD5:B6C3CE1000718B8957385CAE877FAEE5
                                                        SHA1:0725EA60150FBA6EC4D98719193AF6A7212B609C
                                                        SHA-256:5D45D44FFDBEE1BDEAFD1082651EF382164B646F75C53720D0D37E1FEB9C1BEA
                                                        SHA-512:0D29BBCF4DBBD8E1DB670D662BB3471E315DFA90DBF23D36E921B39F7A98E8A5DED836CD2E4AB643FEF9039D8F68A2D0C2EDF440967D494EFDF30E59EA29C0EB
                                                        Malicious:false
                                                        Preview:......................>.......................................................S.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:34:40 2007, Create Time/Date: Tue Mar 18 18:36:59 2003, Last Saved Time/Date: Wed Dec 19 20:19:59 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):207407
                                                        Entropy (8bit):5.130835054236678
                                                        Encrypted:false
                                                        SSDEEP:3072:6mmZR4NTY+fBFvgipoLoJtpu6ndNVE6JsjNNKuX4Nrr9fO0Ehz0tmlgkArzOQAI5:6b8tx
                                                        MD5:83E657E047E43622F4BBCEAE2E3ED26C
                                                        SHA1:6B57E3230F7EB72E477AEDB6E48414E756108C2B
                                                        SHA-256:CBF8CC5001E9509BB035677C6106EF50B74AF9146FDBBD6CB1A2D273A59C7C93
                                                        SHA-512:D6514F1D0BF39089B7DE336BFA0BAC1983E006373CFAC35BC8F03D6A656F8CE1A40499558F8289A1D0D1727C3D3662E9AA169ABE35E033C4DE814CAC37F8FD69
                                                        Malicious:false
                                                        Preview:......................>.......................................................H.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Wed Dec 12 20:36:55 2007, Create Time/Date: Tue Mar 18 18:37:23 2003, Last Saved Time/Date: Wed Dec 19 20:23:26 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):165376
                                                        Entropy (8bit):5.204630458042751
                                                        Encrypted:false
                                                        SSDEEP:3072:JQZ7yok/viUkLZqhZnQeGfJDLsPO46kG/B+:Ig
                                                        MD5:6742E11F8276F6F9B4310F9A505922C6
                                                        SHA1:B63BD30E24C7310953E5C93E24FD41E32E742902
                                                        SHA-256:DF570C2774335D78B52FE6F814C2CC28EC7A550D779E1FBAC909BE924F319977
                                                        SHA-512:76E07A69587EF15CF26071D0CE3FD7438182F779AEB85EDEEB8512EA81DFF949FBF6D49B1D83F5A7BD2F11C29C2686D5B01F75C7563E86D1971762CEACB5F75B
                                                        Malicious:false
                                                        Preview:......................>...........................................................U...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................7...................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 77, Total Editing Time: 13:19:08, Last Printed: Fri Nov 19 19:45:23 2004, Last Saved Time/Date: Fri Jan 21 14:19:25 2005, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):87552
                                                        Entropy (8bit):5.292860622249849
                                                        Encrypted:false
                                                        SSDEEP:384:0IVAgpIDVV3pdY7J84+ZEHnUzmLmCnFJBPncQ5olvPmKgTQVbDpdTC0xIBpIlxyi:UBHpS64+ZEHn0CnVPncxcA
                                                        MD5:D57ABF650F3A7C4ABAFE3A95464A576E
                                                        SHA1:888CC2AB4F445D3C25F5030ABC91839D7A75F015
                                                        SHA-256:4F11CC3F6D5DBA4EC2B1A05ABF3819BA081F21131B80F092F0E8A4EC0E8109A4
                                                        SHA-512:C46831025A5856D9559A9EE045105931441F2EF813202FCA6DFD7E33D71CF63175103BAB94E4F0F07E98E66E21746B182C9F550942E3CECBCB655437FC48509C
                                                        Malicious:false
                                                        Preview:......................>.......................@...........0...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.2........................................................................F......5....`|.5..................O.l.e.............................................................................................................8.............O.l.e.P.r.e.s.0.0.0....................................................................................................:......E.m.b.e.d.d.i.n.g. .3.4........................................................................F.... ..5
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Oct 2 21:58:32 2008, Create Time/Date: Tue Mar 18 18:38:43 2003, Last Saved Time/Date: Tue Oct 7 22:00:07 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):179200
                                                        Entropy (8bit):4.971791860235385
                                                        Encrypted:false
                                                        SSDEEP:3072:8gDFkCHwgaAaIpyGreKLZOpjlbu9yz1LCAcZ/8z5tSZOcOtuA8YLahxbRvaZJSCf:8Qcjwf
                                                        MD5:C39EC68DC1C973913E5680996790FE4D
                                                        SHA1:D9EB6D942E3F5F7901D9242F8C63A0982090544F
                                                        SHA-256:2F1987D27D8BF22DAAC561C2C7A078BCC9EAFA35414ED36C624A6E72A1FED69B
                                                        SHA-512:B97B290FF58EF29C3A29282FFAE0E878A3232BA2F6EAF7368BB5A75643E32BB7BA6F3BD2F756AFF772CDAAB0434211F61C1E1AC8C92098A8810034CA872C5264
                                                        Malicious:false
                                                        Preview:......................>.......................................................G...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.2.......................................................#...%...............................................Y.......T.h.i.s.W.o.r.k.b.o.o.k.................................................&......................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................U...y.......E.m.b.e.d.d.i.n.g. .3.4.............................................O......./... ..............F....`..y
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Nov 16 20:33:18 2009, Create Time/Date: Tue Mar 18 18:37:23 2003, Last Saved Time/Date: Mon Dec 21 15:58:40 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):258048
                                                        Entropy (8bit):4.950934717075591
                                                        Encrypted:false
                                                        SSDEEP:3072:1P1JR2biO95hFqzw8mFJjefgL/ezzrUt6rDTUVykn3T+sNdhKnJgHxXbyjQYmxFQ:Xu
                                                        MD5:D46A8E06CF758CE784DAB6A346C18CC2
                                                        SHA1:5FC8A9A21870F50138241F374A9EC4F81C308827
                                                        SHA-256:EFB54DCAA6451E8820004655327485E7A9C76E57766819A3285B29536F0AD5B2
                                                        SHA-512:1E2AC43866C5C3AB826955DAF76FEDD6C1DEACC48D208F28DF68E7DF46C7AF4D48A10F5298732B5AB8485F065F40542329C4CF93A77756E30E2325FFF01B49CE
                                                        Malicious:false
                                                        Preview:......................>.......................................................r...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................l...............................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue May 8 15:48:55 2007, Create Time/Date: Wed Mar 19 14:57:07 2003, Last Saved Time/Date: Mon Oct 22 15:14:45 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):186880
                                                        Entropy (8bit):4.934801965469349
                                                        Encrypted:false
                                                        SSDEEP:3072:o87jT9+1SaVWBR7VFlScnEQVJIwqccjmUr0tGCMhH0bgkbVci2REk7EXX6lHMqVX:oMjkDkPHk
                                                        MD5:3C139956F2E1AAAC4FBA589907644095
                                                        SHA1:E1E86F73DAEA1EDD3B5C1361DCEC1DD2A7B42697
                                                        SHA-256:F1638B572DF258D7BB77E2F4DA6CF00B30DCCB40A5B43DBB82B251673DB41559
                                                        SHA-512:139BEB1D1FAEFBDE2EBB39909102444BF87A5A64E8AAF1269C3B7AF930FF5413FC5ED33AFE346ED40C26C955BA98C7AE9862F8A121E7476983835BE2D994CB9B
                                                        Malicious:false
                                                        Preview:......................>.......................................................n...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................\...................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Nov 17 16:11:09 2009, Create Time/Date: Tue Mar 18 18:39:02 2003, Last Saved Time/Date: Mon Dec 21 16:03:24 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):253952
                                                        Entropy (8bit):4.88787880649354
                                                        Encrypted:false
                                                        SSDEEP:3072:4OpY1fX4D+QYNyPyELBJ6s0HBp08DS/X/UMmoDX48jp+oUP1jRnx+Us/56AxRqm4:y02Zz
                                                        MD5:BB8CEB43E879AFFC33789AB3A02C78FA
                                                        SHA1:0C75F019D84546AF18C10B0CB4DA2F4F41D43DAA
                                                        SHA-256:1A9EA3240F75F09A639DA23CADCB1523E6EA5C9D3E37DC3D1AEC8D309D29CE1C
                                                        SHA-512:E64DA3919089C1F32CB9F53C7A1A0647D477D84AFE48621FE0318770DB17E324E6A782D50E85556F139D509D45A2EE1A7A7334C9E3E07A189A15B8FC9BCC9F1F
                                                        Malicious:false
                                                        Preview:......................>.......................................................]..............................................................................................................................................................................................................................................................................................................................................................................................................................................._._.S.R.P._.3.......................................................+...-.......................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................u...........E.m.b.e.d.d.i.n.g. .5.1.............................................[.......7... ..............F.....T0.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: Template, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Wed Dec 23 13:23:38 2009, Create Time/Date: Fri Sep 18 14:41:55 2009, Last Saved Time/Date: Wed Dec 23 13:29:52 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):221696
                                                        Entropy (8bit):4.852220976251422
                                                        Encrypted:false
                                                        SSDEEP:3072:lyx6XPLzL0eeyD3xPNkzv5OLJYFRydDaQTD6lo5wUixc2CwfVzkFt4htDDXPUK+8:cxPk0v
                                                        MD5:F75B99D5796990BA2E531D625E00FB2E
                                                        SHA1:4CC6F255FB99858909B7CF37476F3822678C0F6D
                                                        SHA-256:DE6274B458ABB143F4832E93E7BE4D8C13044204ADB442A235D8DCA18A06C860
                                                        SHA-512:EB71CE8F3641C01551EB9AD28D6B746028D8A5786F3C055C9C7F6106318E0A10572C8A902AB080AE39EA8E33DAFA03AC55383039E05179B66271172D0AF8EA10
                                                        Malicious:false
                                                        Preview:......................>.......................................................r...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jul 6 16:30:49 2007, Create Time/Date: Tue Mar 18 18:39:25 2003, Last Saved Time/Date: Mon Oct 22 15:23:52 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):209920
                                                        Entropy (8bit):5.072464260495382
                                                        Encrypted:false
                                                        SSDEEP:3072:HLIBwkq9NAIoSzQ0S7SIZGBRA4R7BnRMbp9Rt7rG6+sdoaSYt9awFUYBaNERBAQU:r8t
                                                        MD5:2FBD7AAF164C869883BEC2BCA05010A7
                                                        SHA1:FE725E820949A2C5D065ECFE0DFA0E8AE7A69F5B
                                                        SHA-256:3DDEDB67316FE565FFAD865ED2D6DD574C3D6AA230A35E20C7E1C01344C8E0F1
                                                        SHA-512:7AB12BBC73486ABFB52D94C147B70981B90271609AAFE45BD25535F28B2A53179A389670758640D839A3A8EC67E6A615599008251887E3C9BFEF71AC13E421C9
                                                        Malicious:false
                                                        Preview:......................>.......................................................I.......l.......................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:31:24 2007, Create Time/Date: Tue Mar 18 18:39:46 2003, Last Saved Time/Date: Thu Dec 20 12:45:54 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):225792
                                                        Entropy (8bit):4.958937507406109
                                                        Encrypted:false
                                                        SSDEEP:3072:HlrC1rCMbggED9nSChJ5BGPIrjTG2ldhg4Z0TlLFhd7pq753VLW3wLEdZGGS+F0y:UxV
                                                        MD5:CD5E5B4E39ECA860862276250E7F25D2
                                                        SHA1:531B5ABB29CEA928C9CCD01B0C721AA0188F342E
                                                        SHA-256:908A0E47CF765F28A66ED79EC769792FA715CBBD3861EBAD833CFCE93375FCA6
                                                        SHA-512:E9A2AFFB0DC8ACD871E13E777CD09A5C9E4BB912252AFC4AB4EF40E088536E5DFE54CE4DEDDF5BEB8B1ABC64CDB221BDF3F96DED417B191038EAA22184848B7E
                                                        Malicious:false
                                                        Preview:......................>...................................................W...Y...............................................................................................................................................................................................................................................................................................................................................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k.................................................9......................................................._.V.B.A._.P.R.O.J.E.C.T.................................................................................................q.......E.m.b.e.d.d.i.n.g. .5.0.............................................p.......J... ..............F....P.D..C...E..C................O.l.e.................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Apr 13 21:15:00 2007, Create Time/Date: Tue Mar 18 18:40:06 2003, Last Saved Time/Date: Mon Oct 22 15:34:20 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):149504
                                                        Entropy (8bit):5.15953513117498
                                                        Encrypted:false
                                                        SSDEEP:768:Ycv3JYOB0T8OEpgwJmvmEGcDKCwaEzJGmG1OnS6fJwaEPz54:YiO8OEp30vOcDKtPVGmGInS6fWPPC
                                                        MD5:4C745F24AB6AD29C007BBCC4ACBD0192
                                                        SHA1:5A40DFC1CE95AAFD3869E55A91250239A35A2944
                                                        SHA-256:DBB69B1CCE9B73FAD9CE55FF4E340131AA3DFCCA7C641551E5CF6FCD586CD4EF
                                                        SHA-512:9001287CF61BFDFF81B20F6864FAAA3A2EC7DA7D278D411130CE1C89086E38DE643FB9D402C09D3B203009E181B57013D6A9A3FC13C213DFE19DB0D653C09B4B
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:45:28 2007, Create Time/Date: Tue Mar 18 18:40:26 2003, Last Saved Time/Date: Thu Dec 20 12:49:10 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):146432
                                                        Entropy (8bit):5.063673625152432
                                                        Encrypted:false
                                                        SSDEEP:1536:BGf37BCzwSJ43KyN3DEXrz4wn7KKgKLli1+49:Af37BCzwSWKyN3DEXfn7KKgKLli4
                                                        MD5:16E2E8C47A83FA4CBA0EF9969DD3EAEA
                                                        SHA1:7B9CF6EB74205A42A27166F24347F17433AAE122
                                                        SHA-256:30D816129634F858170327E77DDD28C02F631FE76EAC00D28434CA167E635C57
                                                        SHA-512:046C63E6135EC52EEEDA975A69BC159E004A5EF58D6729C6766E28AD56B5599AA5F3495F8AA0B9ACBC13D523B1F71B9DC0CD7F5A828DE1069879206A4287DE33
                                                        Malicious:false
                                                        Preview:......................>.......................{...............................}...J...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 21:22:12 2007, Create Time/Date: Tue Mar 18 18:40:48 2003, Last Saved Time/Date: Thu Dec 20 12:51:53 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):143872
                                                        Entropy (8bit):5.048937898720221
                                                        Encrypted:false
                                                        SSDEEP:3072:SEgHKAt1aapBgC9y3Nu/2eX76vUbBKYe/CTLlm1:SEgHKAt1aa1/HKF
                                                        MD5:37BF265114AC548A613E0F811A4E14AA
                                                        SHA1:7EEBD6C38835BC0E2561D3CCBFD0682E5C125889
                                                        SHA-256:27ED2A6B9FE0961396D609EC771E13FB96AE8771BDD125AB45B0849224CA9A91
                                                        SHA-512:D9C9F8EE1C66C2255C9A03057FA29563791A4309E6B299D91B83190EC06F173247DC2B6883C4C403AEA20C75774D567F7D1D07D09A4398FBDD2069CC6CD744BC
                                                        Malicious:false
                                                        Preview:......................>.......................x...............................}..............................................................................................................................................................................................................................................................................................................................................................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................U...........E.m.b.e.d.d.i.n.g. .5.8.............................................5.......!... ..............F.....hO.C...hO.C................O.l.e.........................................................................................................................C.t.l.s................................................................. ...............................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: sboetest, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 20:56:44 2007, Create Time/Date: Fri Apr 4 21:28:15 2003, Last Saved Time/Date: Thu Dec 20 12:55:10 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):131072
                                                        Entropy (8bit):5.157600548856342
                                                        Encrypted:false
                                                        SSDEEP:768:2AuLeepR5sEeSGQk9dq7WEbZFFeQkhwX06timb2/WxDjVaj6gKQk2nuKQ:2AqbsEeEPbZFdYS0K2/Wx/Vaj6m7a
                                                        MD5:1AB6467BB94BFA8E94830B2C7857ECEE
                                                        SHA1:D0571B1EEEA6411F837FBF725F2365A8C52F022F
                                                        SHA-256:14F8DEB2F3CA26B3B5890CA042D3BAE02080A105789EB05504DFE0B956285ABF
                                                        SHA-512:FEDC72819025644B7CEBC93C1AF7008E2F4E05C5ECFDF2E62947705CD0B7F8CBF13C33CD27BBC68A50DFDE27AE08514D0E62125EBFD02BB9ED1A22C8FF76326D
                                                        Malicious:false
                                                        Preview:......................>.......................o...............................r...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:57:10 2007, Create Time/Date: Tue Mar 18 18:41:35 2003, Last Saved Time/Date: Thu Dec 20 13:08:22 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):196608
                                                        Entropy (8bit):5.043187868752451
                                                        Encrypted:false
                                                        SSDEEP:3072:OFoAmv0dDkBDZ5DolqUzTHvUmq7qAap18NCXxrJftxOqfUCfOWenNZwUq73aRYdH:0x7wkZ
                                                        MD5:B3A51CE1A4426170A893BD555B37F02E
                                                        SHA1:863DF9EB5D3CEBE077CBF887656E86B7E4D73397
                                                        SHA-256:0924764EAABC8A2D479EB9DA07A9B03780F3382C8DE6B72BE6DFFFF346607A34
                                                        SHA-512:D9A1FB8C6362B17494574D9C718C931FE7DEA85CD0420180B0A48196AF1568E6CCD9013D1E03339AA0E2D903EC57555314105B1EEAE5F4447707D6CB9EEE94D0
                                                        Malicious:false
                                                        Preview:......................>...................................................M...N...............................................................................................................................................................................................................................................................................................................................................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k.................................................-......................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................s...........E.m.b.e.d.d.i.n.g. .6.0.............................................X.......>... ..............F.... ..D.d.....D.d................O.l.e.................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 116, Total Editing Time: 1d+04:18:33, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 5 12:05:46 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):334424
                                                        Entropy (8bit):5.342674465414266
                                                        Encrypted:false
                                                        SSDEEP:1536:7jO3+tEK0cDamfB2LkNBn0FVs3J0E43q0cmfB2LkNBn0ICGcLI4DMHdjuTEzrIIw:G32EKF6VEJ0EtKCGH9jGEz0IeSdq
                                                        MD5:F17BF9315C6397B804496247421E8E24
                                                        SHA1:3DF470B8684DAC414FF7D6AF3175AA35A14B84DC
                                                        SHA-256:98605AEE454F9557B227622FB414270301E4F63B79947D766129DCE16CD17E66
                                                        SHA-512:B45CACD79F16664A2923635F70083130AA9C6637B6A1AAACE52670DCE21D28064C682CDC751BBE188CBB0544AB6861587836435DABB6188DA865AB795AE2777D
                                                        Malicious:false
                                                        Preview:......................>...........................................................r...s.......M.................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .6.6.........................................................0..............F.....}.j.....}.j..................O.l.e.........................................................................................................................P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 21:26:45 2007, Create Time/Date: Tue Mar 18 18:43:28 2003, Last Saved Time/Date: Thu Dec 20 13:16:27 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):170496
                                                        Entropy (8bit):5.077195832841005
                                                        Encrypted:false
                                                        SSDEEP:3072:lg6OZuzT6RBP01esKcdOPfsL2FVrm57oQ+a:7/k
                                                        MD5:403056F1D56084DC1034682F28C069B2
                                                        SHA1:552AED44B6D7CD1D691B4E519C89DFA37764FB5C
                                                        SHA-256:EC17AC16E8F9F10D26357F53A3ECA16C2E3692B07D0A0B49F8618BC3C7F5595A
                                                        SHA-512:30F5900C8777AED243911549BF7113F10722B74A303AA8D79B83BE9D59221E907307587CD4E2A0186BE3EE756F8259D786C58D6C2D95E80244C2E220E907FA0E
                                                        Malicious:false
                                                        Preview:......................>...........................................................P..........................................................................................................................................................................................................................................................................................................................................................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................(...........E.m.b.e.d.d.i.n.g. .6.6.....................................................1... ..............F.........C.......C................O.l.e.........................................................................................................................C.t.l.s.................................................................0...............................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 21:08:44 2007, Create Time/Date: Tue Mar 18 18:43:53 2003, Last Saved Time/Date: Thu Dec 20 13:19:54 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):122880
                                                        Entropy (8bit):4.960800429743342
                                                        Encrypted:false
                                                        SSDEEP:768:54C7x0agTFz+OSXG/inAMXOFwPSZcP74zvD8QrqFrQDYB:5LEz+OSXG/inzXOFCSuD4zb8Q8r6YB
                                                        MD5:909287CDC971C0D4B31C5D32B688A6BC
                                                        SHA1:EFF5CE5BAC01F247903A402BBDBF409EFF9B725C
                                                        SHA-256:31BD8F97745B70084DC405A219C9ACC90E0C22580CEAB06486EF13B3789EC639
                                                        SHA-512:6D7D694DF5904D20C44195DCD9905A239BB1B8632EC03D7D90787F7D351A82EC56429DA6E22E8A2F9BBA74A2C2ACDA8A70D99F76C8E6BF01FD4604F159F07490
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.0.......................................................................................................|...........T.h.i.s.W.o.r.k.b.o.o.k.............................................................................................l..........._.V.B.A._.P.R.O.J.E.C.T.............................................................................................?...=.......E.m.b.e.d.d.i.n.g. .7.4.............................................)........... ..............F.......6
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:38:38 2007, Create Time/Date: Tue Mar 18 18:44:11 2003, Last Saved Time/Date: Thu Dec 20 13:21:49 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):181248
                                                        Entropy (8bit):4.919450248953279
                                                        Encrypted:false
                                                        SSDEEP:3072:utTgm+uUSbiaPH82Yy1uK8PJRG33hD2Hutv+Ud1mXtNB61s+X2Kp5AKSFGAtjm3R:5Ha8Dm1
                                                        MD5:1A1174381B327B0BE6AEA5AFD221DB4D
                                                        SHA1:5E005EED30F08BCFDC2DC666DC2E54D4AE9E2BE7
                                                        SHA-256:5EA0AC5B9592134749833BB0803ABC6BE782C7FD57CFD0971A7E2E9B80CFE20C
                                                        SHA-512:AE7EEA2A39429B0EB694039026329F252B3ADEBC0DBB6E444E9319DEEAE0F6582D45F6F181DA25CE82634505AC075C49F2168EFF0B9BD46A57662AF042CD7FD5
                                                        Malicious:false
                                                        Preview:......................>.......................................................p...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 55, Total Editing Time: 14:49:41, Last Saved Time/Date: Tue Feb 15 18:01:58 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):158720
                                                        Entropy (8bit):5.268140724248468
                                                        Encrypted:false
                                                        SSDEEP:1536:HZLzpe9R/R1gGWx2oLnq0qwA1s3A85Yh:5Lle9R/R1fEqzt8
                                                        MD5:4882CF47C2091D38AF98D8287394A284
                                                        SHA1:0B4F8D02922F66C946ACBE312382E06245C8C040
                                                        SHA-256:03C156AF47054845AB03DAC77350A3C34D013E332EDC8E6596978B46FEB05244
                                                        SHA-512:9554817DB5026E3F4CC350FAFF41BC2C7DB39A452B1549B6E4184F1FD6FAE828C200FF684D2532BCFCDF5CB6D242E6577CAFA4006347140BE790E10885CD93B3
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only).....D:\VersionControl\SEIMS1.0\Development\2010 YearEnd\Applications\CR Code\CFRS Common\CF_Common\CF_Reports\2007 Forms\cro-2210A.ttx..........cro-2210A.ttx.............................................................0.......................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 135, Total Editing Time: 1d+04:13:02, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Jan 3 19:00:05 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):103936
                                                        Entropy (8bit):5.592327674224524
                                                        Encrypted:false
                                                        SSDEEP:768:zeHskQ4XJukQLWS6lZaqkbDdHkdxkBNox3XRXhTBPSWlPGRCAIIrZTretmXV8hBv:zuhX/6uGRCOX6HHFxGXF6DwNS
                                                        MD5:2AB980981BB08FC87E4B8E885C775867
                                                        SHA1:F72DF109611C6E5A83BA7282C9E8E9ED4E4D9B1E
                                                        SHA-256:3A11440931E4AF31F03346CAF6DEB28AA9592A50B12126DD434D708D4EDB1C39
                                                        SHA-512:B6FEC7CCFFE987A8C4A16A15714014565B6CB19F55ACEBA887336DF297706FE23AC0BA3148BCC7821CB4664187B614FCFB66E0A601BA08F1C049F4A4E0320A13
                                                        Malicious:false
                                                        Preview:......................>.......................}...........|.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................dB......E.m.b.e.d.d.i.n.g. .3.1.........................................................0..............F.....>.nx....>.nx.................O.l.e.............................................................................................................1...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 174, Total Editing Time: 1d+13:39:25, Last Printed: Tue Nov 2 15:30:29 2004, Last Saved Time/Date: Tue Feb 15 18:24:24 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):222452
                                                        Entropy (8bit):5.4064762014400065
                                                        Encrypted:false
                                                        SSDEEP:1536:kp1HN2XddW26XOTh3B0Zld7gpi1ELoAdMLg6:kp1H87WtOL0j6pOmFWM6
                                                        MD5:FADE02A6571C1E7B61F7D2912843299B
                                                        SHA1:5B02062FD22BE8F768CE81B7F6500D0658DD6447
                                                        SHA-256:CAECEBCE8CF9785948FC753AAD941939A8644C61DEEBC32DB66BD020FD60B219
                                                        SHA-512:013E9CC58F5F0EC7C379777CFFA5D25A27EC1673F861A4A52F746E6AC63C8231B8969F7D03E3E63BCA6E531FA2B7657BF0E38B05429BEEF5BFF4D1F59E5BCE2F
                                                        Malicious:false
                                                        Preview:......................>.......................................................'.......v.........................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................+......E.m.b.e.d.d.i.n.g. .4.1.........................................................0..............F.......=......=.................O.l.e.............................................................................................................H...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 56, Total Editing Time: 14:47:29, Last Saved Time/Date: Tue Feb 15 18:02:08 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):163840
                                                        Entropy (8bit):5.228829883731787
                                                        Encrypted:false
                                                        SSDEEP:768:dg+RR+r9hPq0TcyUwDFOkZ8E7VFFyhufjMVok2HKrs0yhjtLvjMVokT6X4GyBBC5:dg+R+y6s6oagYnysA0VWeDm6iE43qf
                                                        MD5:F51BEAB10802D8F46CD91524C29A78A9
                                                        SHA1:825EC58150D825C5245F1FFA0AAE8A8E39EACD4B
                                                        SHA-256:2D4E4ED8AC8175EAE07D880B467815C561E31410E75F33CABA41CD16534E71AE
                                                        SHA-512:60B5ED2AA7DBEFEE444B6B12110A80104B5C6EBAD2F82B9CF73939857AD255F4EFC419766BFAF63B8AB8D1EC48C14996082C7E3F4309CFE151A82FC2B4C15D23
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only).....D:\VersionControl\SEIMS1.0\Development\2010 YearEnd\Applications\CR Code\CFRS Common\CF_Common\CF_Reports\2007 Forms\cro-2310.ttx..........cro-2310.ttx.............................................................0.........................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 122, Total Editing Time: 1d+03:59:21, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Jan 3 12:16:34 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):83456
                                                        Entropy (8bit):5.617886733447368
                                                        Encrypted:false
                                                        SSDEEP:768:kLjO/+KGidgXJBPjjZTX4BPBPn5925VhljMVokLqhdXpBPNZXP8h:kHX/ZX85/5scqhdXfr
                                                        MD5:E708CF7FC5A36DCFB21C4C71D3D3830E
                                                        SHA1:524E043B77C72E1AF8DFE79029FF4843EC93693C
                                                        SHA-256:E1D8DA0491FFE506F325D2FE0A0292A3FE1A3700CA1D8A2E780876E8E4964D7C
                                                        SHA-512:C5A59C922BDE6E6BF36AEA1A6655E4A6743DE391721B233FA1BB54F8A82BA9066551F8815507CC01E25DE00D6800D4421071CEE65591D042FA9476ED04847BBE
                                                        Malicious:false
                                                        Preview:......................>.......................d...........c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................l ......E.m.b.e.d.d.i.n.g. .2.8.........................................................0..............F........@.......@.................O.l.e.............................................................................................................j...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 133, Total Editing Time: 1d+04:11:03, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Jan 3 13:05:25 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):104448
                                                        Entropy (8bit):5.571042801433939
                                                        Encrypted:false
                                                        SSDEEP:768:hkvnrY8fsuk9LCS87Q4kh6+ubXbFiNExN2HXbdBP+VtzY1g5pL8lQM1KXVTBP657:XNyNOXbrctpUKXbuT4WhZXF6Bqn
                                                        MD5:A0C044D33CB4F0DB844EC13C156BDF6F
                                                        SHA1:9FC9F3526F3E9785B898BBC239590DED15AF9AE0
                                                        SHA-256:82EDAF0D98E22A5BF59CB851687DDC0DE7B974DA2BC10AA528BEBA1BEB0F5064
                                                        SHA-512:832F30833ABA02BEF0172AAC47175D9B9A16C3B50AEAC12DD8FF01F13D215DC18BB39A1113EE785C4C3A310B07886FCFD361F76A2A2447A1D77507B17471D34C
                                                        Malicious:false
                                                        Preview:......................>.......................~...........}.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................B......E.m.b.e.d.d.i.n.g. .2.9.........................................................0..............F.....$..F....$..F.................O.l.e.............................................................................................................1...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Oct 15 14:21:07 2010, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Mon Feb 14 13:42:24 2011, Security: 0
                                                        Category:dropped
                                                        Size (bytes):252750
                                                        Entropy (8bit):5.25060703850526
                                                        Encrypted:false
                                                        SSDEEP:6144:YZ+RwPONXoRjDhIcp0fDlavx+W/WEtZ+RwPONXoRjDhIcp0fDlavx+W/WEp3FZ+m:kGo
                                                        MD5:D386DF49CA08E8BC94B632AE6BEF1DB1
                                                        SHA1:4D236FB675BD56A0CCB979BB26809A6278B45C58
                                                        SHA-256:6C7F2A579D4218ABF8375315255417A740D4964E9DE361B6B00E9F6BF1E4AB92
                                                        SHA-512:44BEC47D9E91DED6E741D82FE4C0D98E73A109CD5A9E9543FE47DC1A28D0619E9CB20F607C30BD620918EEE34AA813253DE302A339435EC7835E7BD3081EAC92
                                                        Malicious:false
                                                        Preview:......................>...................................E.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................+........S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........................(...................................................D.............D.o.c.u.m.e.n.t.S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........8...................................................@...........E.m.b.e.d.d.i.n.g. .3.5......................................................... ..............F.....)
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:40:21 2007, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Mon Oct 22 19:22:13 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):86528
                                                        Entropy (8bit):4.881958494433561
                                                        Encrypted:false
                                                        SSDEEP:768:Fl8E2XX+tjZyfSiy947UelYPLVEr+HClN61P:OyjZyWEUelyEr+MN6
                                                        MD5:E34AF91588EF52750B571461438523FC
                                                        SHA1:060DAAD994AD9CA194CF2745B197524AF01E4981
                                                        SHA-256:F05461F9C2DE1E0B19F4F2C4C44BCB9BFEF39586B18EB9D403497586DA5FE981
                                                        SHA-512:0971601CC34A99B221F284D5865323FD060E5F3DAF95EECCB2C0F434A6AC6FB12E77C5E4544BEE59BEFAEA704814979A94C0DC9BA5AEBF510A8F9E177CE44E54
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:40:21 2007, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Tue Oct 23 14:18:36 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):86528
                                                        Entropy (8bit):4.88633501894969
                                                        Encrypted:false
                                                        SSDEEP:768:al8E2XBaqD5vSiyV7UeikdtZ81+D9FCl9w:V5OUei51+D969
                                                        MD5:4C8430FEB6682068847DE23E43B28916
                                                        SHA1:BBC51A81B9A85354CD567DC39EF69579D4320DA7
                                                        SHA-256:C8BE4F958AA658009028FAAD99474AEE6E1834558AFC655BEE3F086E24EC394E
                                                        SHA-512:4547A4CD0869296621E0684AAF030133250DB8E4335BCDBFAB924CE389AAA826C477486176199688719CE7FBB00D628E079BD89033D7D1B32F0B94144ED03155
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Apr 28 17:00:15 2009, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Wed Apr 29 22:24:07 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):90112
                                                        Entropy (8bit):4.881150690200426
                                                        Encrypted:false
                                                        SSDEEP:768:O4l8E2XlCGZJgtiSCg5Ut5Zl8MlHsDllxW:O5ZMUt5HHsD1
                                                        MD5:1A8B9BAB9A26DE6C4D078DE140FAEFAA
                                                        SHA1:108F6E387FFA826F7E52BCD4CC9A01B7428FB809
                                                        SHA-256:2FDEB8A9E37FB4B225AB55F317F06D00F280890466F03C0309EF76D577C29DE1
                                                        SHA-512:95A587D23889964C05FD9AB1C90F189947526697C0060386EE8CDDB26152E758E3F1C3167341CBE13815B5907017820AC20A1B97C799C162EA99BA3CEEBD7CEF
                                                        Malicious:false
                                                        Preview:......................>.......................................................~................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedd........ddddddde.dcddddtdA..dd..ddd.dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffd.fffffffgfgfgfffffffffgfffffefffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf...........................c....._..._....8....o..... ..hoooo}..................oooooo.s.....I..tssssQ.p......ppp~3........>...p{qppppqpc{sh...^AFCA,...]0........=...s.s.....K..tssssP.p......ppp.3........94>..p{pepppqpc{so...^AFCA,...]0........:7=..s.s.....A..tssssm.p..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Mon Oct 22 19:25:35 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):97280
                                                        Entropy (8bit):4.977162636578716
                                                        Encrypted:false
                                                        SSDEEP:768:iR0jbfG0fYJfrpgAnVY7IfsUMXHwKY0/Oxlu7cimw:HbtfofTVxf/MXHwKY0/AuIi7
                                                        MD5:896F8A0D7E194A0685F0955C6FCD724D
                                                        SHA1:32AFD8CA6ADBFE20CB4D818F3C90FB4FD81BA04E
                                                        SHA-256:9AA224A1B697BCC8292EA5FFDC9BAF52F81287B157EA48A230F60024631A4614
                                                        SHA-512:BEC97B6CFF0656AC4F2AC8ABD20A4139C1B0E501AE69EF02840BD6DC9C0129D13BBBB19D2DCC19E41A342C18CC8726BE6BEB20A7BAB6391C95DA4310A0174026
                                                        Malicious:false
                                                        Preview:......................>.......................b...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.............................................................!.......................................................T.h.i.s.W.o.r.k.b.o.o.k................................................."......................................................._.V.B.A._.P.R.O.J.E.C.T.................................................................................................).......E.m.b.e.d.d.i.n.g. .2.2.....................................................%... ..............F.....P..
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 19:02:52 2007, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Fri May 16 18:49:41 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):136704
                                                        Entropy (8bit):5.122314043578528
                                                        Encrypted:false
                                                        SSDEEP:1536:xv1oKLyI9q8o4zTcb2UlgcWK+xTrz7axPzUsdiallTonTIn2:xv1oY3z7
                                                        MD5:CEB12F669CCD7F4EECDA6E6526546E0F
                                                        SHA1:0DD99622131222D076229E0F8C407F74625E1CAE
                                                        SHA-256:9046CA568975FAD9DF681D3330D74EB9D0DA3649DD2D047E18578B91073B6F8A
                                                        SHA-512:DCB2B77ABE0973ABC483B9248754E57CBBDBF9BA989B62CA4C200851B26C09B6C894C593FC14375E6FFEF93FE5A77B822FBC57A89E054A0866B4BB52508A9217
                                                        Malicious:false
                                                        Preview:......................>...........................................................P...........................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................U...........E.m.b.e.d.d.i.n.g. .3.1............................................."........... ..............F.......
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Title: Certification of Inactive Status, Author: James Lell, Template: Normal.dot, Last Saved By: msteffens, Revision Number: 3, Name of Creating Application: Microsoft Word 10.0, Total Editing Time: 01:00, Last Printed: Wed Oct 15 21:58:00 2008, Create Time/Date: Thu Oct 16 12:01:00 2008, Last Saved Time/Date: Thu Oct 16 12:02:00 2008, Number of Pages: 1, Number of Words: 178, Number of Characters: 1019, Security: 0
                                                        Category:dropped
                                                        Size (bytes):180224
                                                        Entropy (8bit):5.3712177177850355
                                                        Encrypted:false
                                                        SSDEEP:1536:+fpOF0kQmsMRT9CrDc0QrilK3dQKDj2MQCFju:8py0kQm9RT9CrFQXDj2gA
                                                        MD5:AA19D7736F3EF3BC68B25908B726999A
                                                        SHA1:3E2A28FA79CD93F0D47CD8E6FA9F09E8A2F12ED9
                                                        SHA-256:FB22AB8A19306CF0CBC659A6353A22880960907DD5182A83A713C94DA95DBFC9
                                                        SHA-512:D4510269FC2294B89C4AC530F2684F596953BDE1F5585576D2659ABE657BE436D08C2965343FB0A0713FEB09BF941FA203536E26E2805200124A835FC30C5242
                                                        Malicious:false
                                                        Preview:......................>.......................................................:................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedddA..dd.fddddddde.dcddddtdA..dd.fddd<dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffg.ffg.fffgfgfgfffffffffgfffffefffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf..........8....o..... ..hoooo}..."..............oooooo.s.....K..tssssQ.p......ppp~3........>...p{p.pppqpc{sn...^AECC^B,...]0........=...s.s.....O..tssssW.p......ppp` ...4..........p{p.pppqpc{sl...^AECC^B,...]#...7..........s.s.....K..tssssQ.p......ppp~$........>...p{p.p
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Title: Certification of Inactive Status, Author: James Lell, Template: Normal.dot, Last Saved By: msteffens, Revision Number: 3, Name of Creating Application: Microsoft Word 10.0, Total Editing Time: 01:00, Last Printed: Wed Oct 15 21:58:00 2008, Create Time/Date: Thu Oct 16 12:02:00 2008, Last Saved Time/Date: Thu Oct 16 12:03:00 2008, Number of Pages: 1, Number of Words: 42, Number of Characters: 241, Security: 0
                                                        Category:dropped
                                                        Size (bytes):463360
                                                        Entropy (8bit):4.580779504933828
                                                        Encrypted:false
                                                        SSDEEP:3072:Xx0kQm9RT0PhzfHiQ+z0kQm9RT0PhzfH7QKR50kQm9RT0PhzfHBQ:h4yRTAM4yRTAPr4yRTA
                                                        MD5:3E283F1FD6FE821EF531355E09CD8FAC
                                                        SHA1:DE14DF4F69EB7123F4CD2AFF72F093C6BBF7BDF5
                                                        SHA-256:77EA4BF10E6EB2AB9F8C4A752D67A65F268C6D9F4501DABCEABD1B0E8236A714
                                                        SHA-512:B256F3E0AC5282F399C7DDEC15E896FDEF25E73559A0630CC036EB3A849F9AEC22267776DA851E77B34950D0B6BAA0B273B72B63682D7D59EC24F88C853F2E1B
                                                        Malicious:false
                                                        Preview:......................>.......................7...........6...........................f...T...c.................................................................................................................................................................................................................................................................................................................................................................................................................................D.o.c.u.m.e.n.t.S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........8...............................................................E.m.b.e.d.d.i.n.g. .1.7........................................................................F......Nx./....Nx./................O.l.e.........................................................................................................................D.a.t.a.................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Title: Certification of Inactive Status, Author: James Lell, Template: Normal.dot, Last Saved By: msteffens, Revision Number: 3, Name of Creating Application: Microsoft Word 10.0, Total Editing Time: 01:00, Last Printed: Wed Oct 15 21:58:00 2008, Create Time/Date: Thu Oct 16 12:01:00 2008, Last Saved Time/Date: Thu Oct 16 12:02:00 2008, Number of Pages: 1, Number of Words: 178, Number of Characters: 1019, Security: 0
                                                        Category:dropped
                                                        Size (bytes):646656
                                                        Entropy (8bit):4.870802515688482
                                                        Encrypted:false
                                                        SSDEEP:3072:9n0kQm9RT0PhzfHtQfl0kQm9RT0PhzfHFQ+l0kQm9RT0PhzfHyQuU5pD0kQm9RTC:J4yRTAc4yRTAD4yRTAyU5h4yRTwrdOi
                                                        MD5:0AF05A4650FDF343A9C13262E16F986E
                                                        SHA1:9D7EDAFFC85356249BCABCC8A25B556E8615B36E
                                                        SHA-256:C87F73A359565D04941EB305AF7C9FE5B4818F577CA1319F8B578B69F2E4A947
                                                        SHA-512:C8FC8A1C1E3EBEA9927D0ACCD8A0C27D6F60F4A13E642DF894CE7387097D76B1F557B184A18DB80EDC7D7E50EF47BBAC65D8B35ACC349F415B9707698ACA69D2
                                                        Malicious:false
                                                        Preview:......................>.......................................................a...............................%.................................................................................................................................................................................................................................................................................................................................................................................................................S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........................(.......!...........................................t.............D.o.c.u.m.e.n.t.S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........8...................................................l...........S.u.b.d.o.c.u.m.e.n.t. .7...................................................%..........................t./..@..t./..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Oct 16 21:17:12 2007, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Mon Oct 22 19:28:02 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):162304
                                                        Entropy (8bit):4.830184722169816
                                                        Encrypted:false
                                                        SSDEEP:768:HIVX+tXppv5JZp8scM0UET/5r9//PSfdNI46B4yGUbV2fiWwhgVQwq+1o:HIVX+IJafdNH6B4yZbV2fiWwIq+1o
                                                        MD5:B1056B83A838C1A1050782D8DE2B86FA
                                                        SHA1:A813E6A224949231A9B9AB4E7B7F675125D25D47
                                                        SHA-256:19F4FDA329AF5201897E76EB13A18FF469BB6C1C90D63679182A0E631C943026
                                                        SHA-512:DD3A5E08193527DF583206CBAA51B2AE0BE6A428A5FF37FA6BC37BD08601BDB24238D5C615FAE54B47136D154E49B503D9A100034BAEE40125F43B2BDE68DAB9
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................0.........................SQL.....PdSMON.DLL....%Active Data (Field Definitions Only)....RD:\DEV\CR Code\Remote Filing App\Version 2004\CF_Remote\reports\2002\cro-4100.ttx..........cro-4100.ttx.............................................................0.........................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: programmer, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue May 29 15:40:58 2007, Create Time/Date: Tue Mar 25 14:35:37 2003, Last Saved Time/Date: Mon Oct 22 20:27:11 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):116224
                                                        Entropy (8bit):4.831635357966716
                                                        Encrypted:false
                                                        SSDEEP:768:FZMVR2jqTkOCsKswrOnHz9rm32Q3cpFHfuis3+nc:FVWTkOLKZraHzZmT3cpFHfur3+nc
                                                        MD5:5379BC15FFA3C25789C420B782932967
                                                        SHA1:E9C3245791ED044E567EA105AEBE066A3DD2DC66
                                                        SHA-256:01B3854F730104522577E3BF28277EA5808DAE318690B7DF3F2934C382C957DC
                                                        SHA-512:1E65192F90136EA88EFE3DD2F335FA5568538EA390DA7B1EAE50ACBCD4946590BD608AB4FF0D4A65BCBD2803AB6F3697CB966B09DA09433EF15E39017785696E
                                                        Malicious:false
                                                        Preview:......................>.......................v...............................y...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Oct 16 21:22:03 2007, Create Time/Date: Tue Mar 18 18:49:06 2003, Last Saved Time/Date: Mon Oct 22 20:31:02 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):222577
                                                        Entropy (8bit):4.92535757129126
                                                        Encrypted:false
                                                        SSDEEP:3072:IfsIsefpkcEtHsDwC6Sag1Lo4cOfpkcUd3MDwC6SaXaoONv9tKAd0oNhzwcAS66p:kn
                                                        MD5:7770B0334CFBBE2CAF0B823D0D73024E
                                                        SHA1:38152A320F374F5115C0E4C4A249C4484D194CAB
                                                        SHA-256:F3CB0021FC58775DF1965E1AA682EDD8B228991ACBE3C7ECBBB50872CDAC5032
                                                        SHA-512:AF64DBBEE6A881D6C024CDC63B5C63A9DC7FC378B95D1FC3ECC61B421F9B3EDCE2715D5EA2F8C8290D96AACE5910561A12E7B6E8E2A6DE759989D3B97A999705
                                                        Malicious:false
                                                        Preview:......................>.......................................................T.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Revision Number: 19, Total Editing Time: 04:03:46, Last Saved Time/Date: Wed Mar 18 14:37:02 2009, Create Time/Date: Wed Jan 4 17:35:48 2006, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):45568
                                                        Entropy (8bit):5.362863051604835
                                                        Encrypted:false
                                                        SSDEEP:384:dOOtOnXLo80Y31Q7yrelcg6BfJnuewBc18:dftOilH
                                                        MD5:F333AB5364641E71074B186AAB1753BD
                                                        SHA1:BD37BB9C3814C0B6CAFD478DD317C19FB35BB81F
                                                        SHA-256:ECEB4597F02DBAC4C570E53EEFAA40D45862058609DCFF34B4E612CB5CA8E165
                                                        SHA-512:8E0BF47C1FC1A55D0EC0D9BD435235EA3D8F66235DC075F5C32EDD46D9D03088A4743607C96F12D5C3E298F384CC14BB8D8094B912AC0B69F24A4A8872698C5A
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...............................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Microsoft Access Database
                                                        Category:dropped
                                                        Size (bytes):4894720
                                                        Entropy (8bit):2.4562849415129704
                                                        Encrypted:false
                                                        SSDEEP:6144:aduPCcaI/tlAIZ8Jo3Vw3QWjz3dwDQW8SypfZ3L1vLMqeFjFJJomc5S:xCF4tlAIK7IEEhOmcY
                                                        MD5:FED4926EDE0F27BB72EFFFAC8FC55876
                                                        SHA1:1136FC24FD788D3912F01B415A7A9CFD1A1C2E61
                                                        SHA-256:EA2D8537CF76616D0EDA204F64E617A4989CC1AAF1C31B5F297400EFFADAB8E5
                                                        SHA-512:162FB0823FC97AF70CDCB6CC0E617C2906D3EEF52440C5A76E577745407C0628D444FF7570ED9107DB1D632B356DAF7C3CE1BC9D86DD884D493BED311193684E
                                                        Malicious:false
                                                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.U.7g....(.)..`n:{6...MZ.C...3..y[..|*..|.........8..f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 1 14:44:33 2023, mtime=Fri Oct 25 16:18:10 2024, atime=Fri Dec 1 14:44:33 2023, length=4243456, window=hide
                                                        Category:dropped
                                                        Size (bytes):1218
                                                        Entropy (8bit):4.6255815748257065
                                                        Encrypted:false
                                                        SSDEEP:24:8uCEudOEDKYE+KYYA+uAm4sLy4A+WdIzoUU1lpVO3yfm:8u1udOaE+Zx+1m4z4TWdK9Olb
                                                        MD5:536026423639FBCA4317964E563EC917
                                                        SHA1:058D843F4034E1FCFF663C881890D72811473385
                                                        SHA-256:FD80ED4227260DB5DD270FD02D1D308A2BC9CE45CCC0C730F46040FA23B44CBE
                                                        SHA-512:3BDB8F8B41372510F0DE525D0CFB6D04424EC4996A3552559B80A731AB5BC95CACA2E7D6064D14AECC172A82BAADB096344B723CAD6C66E7C73FC569B12854CB
                                                        Malicious:false
                                                        Preview:L..................F.... ......Gm$.......'.....Gm$....@.....................C....P.O. .:i.....+00.../C:\.....................1.....YYC...PROGRA~2.........O.IYYC.....................V........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1.....YYC...SBoE..:......YYC.YYC..............................S.B.o.E.....j.1.....YYC...CAMPAI~1..R......YYC.YYC..... ........................C.a.m.p.a.i.g.n. .F.i.n.a.n.c.e.....\.1.....YYF...CFREMO~1..D......YYC.YYF.....!....................."...C.F. .R.e.m.o.t.e.....h.2...@..W.} .CF_REM~1.EXE..L......W.}YYF......I......................P.C.F._.R.e.m.o.t.e...e.x.e.......s...............-.......r............i.l.....C:\Program Files (x86)\SBoE\Campaign Finance\CF Remote\CF_Remote.exe..S.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.B.o.E.\.C.a.m.p.a.i.g.n. .F.i.n.a.n.c.e.\.C.F. .R.e.m.o.t.e.\.C.F._.R.e.m.o.t.e...e.x.e.........*................@Z|...K.J.........`.......X.......
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5675007
                                                        Entropy (8bit):6.48705961905541
                                                        Encrypted:false
                                                        SSDEEP:98304:2hG63qsl7dEhYCHnWzXzLbVI9AB5dECNhc6ZzH2oYK13icjqsNTUjJG:2Jah2zXzL5IWB5JhnHfFIG
                                                        MD5:3B2D532673D1567116105D04C621CDBA
                                                        SHA1:F0892A2DCF772529C115C15E6B1A510B4DC214E1
                                                        SHA-256:FD6D2298B1B5DD14A9F02207FAA4D7D7DC5F5B399E71F2F4EC3680C2DBC6DF0E
                                                        SHA-512:15ABF21DCF9ABF346DDFB6B35F75C607B4E6CF4518B629C39ADCA5E4690955D70C46C5A842F73FE7373FA6A7F7860DB514D3815DD04D1280DAD7A7D1A315B672
                                                        Malicious:false
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?..`.................z;..........e;.......;...@.......................... Y..................@............................?..Y... D.......................................................?.......................?......`?......................text.....:.......:................. ..`.itext.......;.......:............. ..`.data...(.....;......~;.............@....bss.....}....=......Z=..................idata...Y....?..Z...Z=.............@....didata......`?.......=.............@....tls.....A...p?.......=..................rdata........?.......=.............@..@.reloc...I....?.......=.............@..B.rsrc........ D.......=.............@..@.............pY......\W.............@..@........................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {D529246B-78E5-4E65-A3A2-8E1040E91E59}, Number of Words: 0, Number of Pages: 200, Title: CF Remote, Subject: CF Remote, Keywords: Installer, MSI, Database, Author: NC SBoE, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                                        Category:dropped
                                                        Size (bytes):868352
                                                        Entropy (8bit):6.2772030756930395
                                                        Encrypted:false
                                                        SSDEEP:12288:gmLYSxeFmPBKXsbzlDSJjQ8guBoN2KA2wKc7wMz7:XLYSxHW5BqPA2fc7wMz7
                                                        MD5:C42393B9643339D7F19EC2C717562646
                                                        SHA1:2D6F6B8CE8DE076516095B9E35157055F530EF41
                                                        SHA-256:2C3F9688DD4A7D3AFB3A28DDFA9A3A584C94E9029887DE5B3EF50F1DBB3D334E
                                                        SHA-512:72BCBA2C66EBD01BDDF1490A65BB7E640D967B86AABE22C93E15C1EDF560C6C3E4A22D7601D2C085466E8E05F2129417DA2BBE21B4F342641741667BEF6E80E8
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:7-zip archive data, version 0.3
                                                        Category:dropped
                                                        Size (bytes):8694055
                                                        Entropy (8bit):6.569101251424524
                                                        Encrypted:false
                                                        SSDEEP:98304:6bCyTWyZzxtJNL05f9tAYnA3U9XHsHcCXq8vXKEUo/wRZlV:Ia8KEUo/wdV
                                                        MD5:FDC346FFDFDD1F15F1DBA95695960160
                                                        SHA1:4983376DAB7201E8AF1728D2F6FD9AEE0CCAD376
                                                        SHA-256:74924F08BD5817B532B441E57C5D9C7CB55AD001C410C038DE1F54427D1160E9
                                                        SHA-512:AE7F0A4EC374A78816B7DDF3B90BD358729BC6E0C153C08CA4AC17741F6E72C0A3E43B822DD3A55FA15C603314B78B4D7E43D8F131ED60143CFB9B7C65E0B66E
                                                        Malicious:false
                                                        Preview:7z..'.....%........{........fX....TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):74960
                                                        Entropy (8bit):6.080943948881524
                                                        Encrypted:false
                                                        SSDEEP:1536:3TlRSuxQYyqUB9XzWqxGHVcIIX5ZDBZGscEvWlExtJl966CX6q0uE:FfUB9XamGHpw5ZDXXPOixtJz3CX6qQ
                                                        MD5:81E5C8596A7E4E98117F5C5143293020
                                                        SHA1:45B7FE0989E2DF1B4DFD227F8F3B73B6B7DF9081
                                                        SHA-256:7D126ED85DF9705EC4F38BD52A73B621CF64DD87A3E8F9429A569F3F82F74004
                                                        SHA-512:05B1E9EEF13F7C140EB21F6DCB705EE3AAAFABE94857AA86252AFA4844DE231815078A72E63D43725F6074AA5FEFE765FEB93A6B9CD510EE067291526BB95EC6
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~c.3...."......#.................3.............p................................g....................................................%.......................... ...8............................................................................text....................... ....... ..`.data...............................@....rsrc....%.......&..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:MS-DOS executable, NE for MS Windows 3.x (DLL or font)
                                                        Category:dropped
                                                        Size (bytes):2272
                                                        Entropy (8bit):5.626412274243338
                                                        Encrypted:false
                                                        SSDEEP:48:iuB0q8Z8LCQZ5U45owLkq10Ju1pwZbQP+DWmnDypKGDsQVG:NB0q7L35S22u1pwZC+ymnDmKGDsv
                                                        MD5:7210D5407A2D2F52E851604666403024
                                                        SHA1:242FDE2A7C6A3EFF245F06813A2E1BDCAA9F16D9
                                                        SHA-256:337D2FB5252FC532B7BF67476B5979D158CA2AC589E49C6810E2E1AFEBE296AF
                                                        SHA-512:1755A26FA018429AEA00EBCC786BB41B0D6C4D26D56CD3B88D886B0C0773D863094797334E72D770635ED29B98D4C8C7F0EC717A23A22ADEF705A1CCF46B3F68
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZR.....................@...............................................!..L.!This program requires Microsoft Windows...$.......NE.<............................1.@.P.|.....M.............R.......r.P.r.`.r.q.r...........l...0...............p...0..........W95INF16...WEP...DLLENTRYPOINT...........KERNEL.USER.SETUPX....?.z...?.....?.!...INF Installation Library...W95THK_THUNKDATA16.....................................................................EU...WQ.V..j.j.Q......j....f..]M.EU....f..]M....2...v.2...6...:.XZh..h..h>.hV..RP.....w95thk_ThunkData32..U..F..p........U...h ..h...v.f.v..@.I.=....@.........V.^.&....f.v..F..P.........t....M.v...6L...6X......Ph...........u.....P..6d........t..v.......j....F..^.&..3.^.........WV.v..v.V......N.....N.;.v.QVQP........&.?\t..F.&..\G.^.&.? t.......F&.< t..v.W.V.....^_........WV..C.......f....3.........F..F.f.v..F..P............j......P.......u......P.......t..F...j.f.v......3.....~....f.~..u..F......F...3..F.F.F.f+.f.N.f.N.h..h...N..Q......
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):4608
                                                        Entropy (8bit):2.9774207313950316
                                                        Encrypted:false
                                                        SSDEEP:48:6Z3Mi+h0U47yaE6akf1WbvgFfSBZW3IezfXNFk5WgF:VEyaVaVv+aPWJXNyWg
                                                        MD5:4BE7661C89897EAA9B28DAE290C3922F
                                                        SHA1:4C9D25195093FEA7C139167F0C5A40E13F3000F2
                                                        SHA-256:E5E9F7C8DBD47134815E155ED1C7B261805EDA6FDDEA6FA4EA78E0E4FB4F7FB5
                                                        SHA-512:2035B0D35A5B72F5EA5D5D0D959E8C36FC7AC37DEF40FA8653C45A49434CBE5E1C73AAF144CBFBEFC5F832E362B63D00FC3157CA8A1627C3C1494C13A308FC7F
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=2...........!......................... .....p.........................p...................................... .......@..<....P.......................`..0...................................................d@..(............................text............................... ..`.rdata....... ......................@..@.data........0......................@....idata..@....@......................@....rsrc........P......................@....reloc..\....`......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):147728
                                                        Entropy (8bit):5.909287934496192
                                                        Encrypted:false
                                                        SSDEEP:3072:h+qD1Cd/Oa5kXFlqkFGr3CAP7LCyInPEggen5Ez:hlCd/OaaFEjCAPKyOE6na
                                                        MD5:C89E401800DE62E5702E085D898EED20
                                                        SHA1:72FB4F088C6AC02097B55FB267C76FBF5E0FA1F7
                                                        SHA-256:DE83C9D9203050B40C098E4143EF8F577AA90016C7A64D4F2931B57A4C43E566
                                                        SHA-512:70006D70DCB47361FF43E4F7C458655AD2474B70CB917873AA77D2CC06465A68D375D36C494D154A03DBBFF891DF7DD6CAB3D2C7B08E8650B9FF170E30838070
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ru..ru..ru..mf..ru..ru..su.Rich.ru.........................PE..L....!.6...........#..................... ........<e.........................`... ..^q..................................n.......d....0.......................@..0...P!............................................... ..L............................text...n.... ....... .............. ..`.data....d.......P..................@....rsrc........0......................@..@.reloc..v....@... ... ..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):22288
                                                        Entropy (8bit):4.814478820147639
                                                        Encrypted:false
                                                        SSDEEP:384:23Fob3slaN3oF1fHICOoMzMv/QTIBjDVquODJXsUW7ftWs6:Yo7s28JnOxzMv/QsBjRqugXspd
                                                        MD5:3B180DA2B50B954A55FE37AFBA58D428
                                                        SHA1:C2A409311853AD4608418E790621F04155E55000
                                                        SHA-256:96D04CDFAF4F4D7B8722B139A15074975D4C244302F78034B7BE65DF1A92FD03
                                                        SHA-512:CF94AD749D91169078B8829288A2FC8DE86EC2FE83D89DC27D54D03C73C0DECA66B5D83ABBEAA1FF09D0ACAC4C4352BE6502945B5187ECDE952CBB08037D07E8
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...rD.2....i......#.....2...................P.....w.................................................................?......*<..d....`.......................p..4...............................................X....................................text...#0.......2.......... V...... ..`.data........P.......B..............@....rsrc........`.......N..............@..@.reloc.......p.......R..............@..BkD.2(.....22...jD.2?....%.2J...........ole32.dll.KERNEL32.dll.USER32.dll.ADVAPI32.dll..........................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1357600
                                                        Entropy (8bit):6.676037472083791
                                                        Encrypted:false
                                                        SSDEEP:24576:BbQr0YK8Usasyc0ZP0rqqTKOdB4Ssab0IOb/Ng/r0GEj:13CaZzqrdSSfW/WTjEj
                                                        MD5:7084D611F4646FD3652B1ED603A1F4CD
                                                        SHA1:9CA06B546644D37A62F11F79B1463FEBD974EC74
                                                        SHA-256:DEA658AA6156AD4C54BDD4BDE1883CA088D38CDD0E220946F3CE44767FF42BAE
                                                        SHA-512:9D00AC1C77EFEABA6AD59E461C2E396B716D4B888DF8D0FC2CBB7D9D1572C3AF12B7DF4822E19CD73DDDCC346AC6C481B9D725A1E1B5994BCDF74EEC93E41981
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.....................x.....................Q................................[~..................................N.......\7.......Z...........`.. W... ......................................................,................................text............................... ..`.itext.............................. ..`.data....O.......P..................@....bss.....S...P.......8...................idata..\7.......8...8..............@....didata..............p..............@....edata..N............z..............@..@.rdata...............|..............@..@.reloc....... .......~..............@..B.rsrc....Z.......Z..................@..@.....................`..............@..@........................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1386496
                                                        Entropy (8bit):6.507253562372704
                                                        Encrypted:false
                                                        SSDEEP:24576:jrWIEO0eDfcPOvCOpMEPJonhql5oHS+zh3JajtObuF+T+NUFRjUgIeX40sgdp:jrOuCQhJohq3oHrh3JajtObu2+NUF5Vd
                                                        MD5:F28EB5CBC3CA6D8C787F09F047D1F9C8
                                                        SHA1:70DB1FAC822974BC9B636A984BCC1DA2E67F8DE5
                                                        SHA-256:3EF32E0152CC3FA07C417E6AADF9EAD83A17B5FDEE73799044E1BD7564725D6E
                                                        SHA-512:84F811F75E9D5143898728D2109B349802A292D4EF2CCAE4B4421D20268A33C6DDEE9C70E8BDEB474A3AC70307B2554C00CE786CA1F446807610FA2717F3745F
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:@...........#.........v.....................f......................... .......N...............................0...Q..............L.................... .......................................................................................text.............................. ..`ENGINE.............................. ..`.data....n.......p..................@....rsrc...l...........................@..@.reloc....... ....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):598288
                                                        Entropy (8bit):6.644743270512807
                                                        Encrypted:false
                                                        SSDEEP:12288:HCKynQWKglDhrUtrvT/NInIk4NDXsR6lMlpGz:HGXqB8V6lMlMz
                                                        MD5:7B156D230278B8C914EF3F4169FEC1CC
                                                        SHA1:6B58E20B2538CB308091DA838710F6AAD933A301
                                                        SHA-256:BAEB2F7C1B8BE56738D34E1D1DDF8E0EEBD3A633215DC1575E14656BE38B939D
                                                        SHA-512:E4EC2BC714069E0A6B56D89B52AABAD92E5BA741DC6F26D2FC2D72AA9AD2EC465DEA523CCCD810331AB78B5FB8A1244B2B521303418EAD5BD6BE5A58B43794C5
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ibW.-.9.-.9.-.9...7.(.9.{.*.,.9.-.9...9.Rich-.9.................PE..L....#.6...........#..... ...................p....4e......................... ......+................................6..%$.......................................g...................................................................................text............ ... .............. ..`.data....a...0...`...@..............@....rsrc...............................@..@.reloc...g.......p..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):164112
                                                        Entropy (8bit):5.8462943829831575
                                                        Encrypted:false
                                                        SSDEEP:3072:+VrhrwLXcA2Ha/joWklbo/Acjwm4AaW7zozn/zgOh0Z76:fklbsqmyWnoz/P
                                                        MD5:CE0155405EA902797E88B92A78443AEB
                                                        SHA1:8ADFF69050D14A57D7F553CA8978439AF188C192
                                                        SHA-256:789C3C45EDA1749BD939F4A96616E1E9EF1B7DCC62A2889F65088954C64D0938
                                                        SHA-512:3FDE09067F9CA8D315DE07C8DB972F99723EA4C3F997DC58210F9D6565CAA9935C79F13E8B2D20ADC5609919A381E4C2A90A0B3123A35947997229D7C615E162
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.'r!.I!!.I!!.I!w.Z!*.I!!.I!\.I!Rich!.I!........PE..L....!.6...........#.................)... ........0_............................. ..>................................................0...3...................p...... #............................................... ...............................text...q.... ....... .............. ..`.data....X.......P..................@....rsrc....3...0...@... ..............@..@.reloc.......p... ...`..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):17920
                                                        Entropy (8bit):4.083884450202126
                                                        Encrypted:false
                                                        SSDEEP:384:cogoEvM/uFrR+X6QNn1pcJIrWocDGWct:cogoEvM0rgqQNn3
                                                        MD5:1B02577F0ADDEA32EB02A50D4A4CDD1E
                                                        SHA1:36F701CCEC78A5D218FEA23FD05351890F14CF7D
                                                        SHA-256:6EA525BFACE5467C1045C3708F339A4B92A3A273F70656E061C7F7322C56D667
                                                        SHA-512:87FD4AA5158D09EB97B6131E651DB2A4761546907A960AF7792F8E95947C0A825E84F88ECCF42EC896FF5BB2BBC461488B898D5F1BD853847317493C44B330C9
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......eU!.!4O.!4O.!4O.!4O. 4O.Rich!4O.................PE..L....!.6...........!.........D...............................................p...........................................................@...................`.......................................................................................rsrc....@.......B..................@..@.reloc.......`.......D..............@..B.............!.6............ .......8........!.6............P........!.6............h........!.6.....................!.6....................@:...........J................T.Y.P.E.L.I.B.MSFT................A...........*................................... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...............h...........................................L...P.......
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Generic INItialization configuration [DestinationDirs]
                                                        Category:dropped
                                                        Size (bytes):1069
                                                        Entropy (8bit):5.4959184158351215
                                                        Encrypted:false
                                                        SSDEEP:24:yuZq732XeLfX8IUy3k8exg5S3X8n2uNXVANXVMbNX9NXR/NXVuZZNXV0pT7:BJeL/8IhvFSn82CVoVMB/DViDV057
                                                        MD5:F8854BDCD55ECCF24F077981ADFE6B9A
                                                        SHA1:377FC226B1C10B244F1E32F6EA3A20B5D47D4777
                                                        SHA-256:E5A9050E93487A1D296CEEC10B95BE9F92EB877AA2913296B5C31B9F74F7C788
                                                        SHA-512:6331F337A1595D6F83281614E6A92AABA9D8B27FDA3B5CF4E85F1B49AC335E10F0F62CD147131D53C473B3ACC42BC27F2D02073F0CC60755CA10871EF2E7AC8E
                                                        Malicious:false
                                                        Preview:; INF file for Visual Basic 6.0 Run-time Redist Pack....[DefaultInstall]..CopyFiles=install.files..RegisterOCXs=RegisterFiles....[DestinationDirs]..install.files=11....[install.files]..OLEAUT32.DLL,,OLEAUT32.DLL,32;..OLEPRO32.DLL,,OLEPRO32.DLL,32;..ASYCFILT.DLL,,ASYCFILT.DLL,32;..STDOLE2.TLB,,STDOLE2.TLB,32;..MSVBVM60.DLL,,MSVBVM60.DLL,32;..COMCAT.DLL,,COMCAT.DLL,32;....[RegisterFiles]..%11%\OLEAUT32.DLL..%11%\OLEPRO32.DLL..%11%\MSVBVM60.DLL..%11%\COMCAT.DLL....[OLEAUT32.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=2,40,4275,1....[OLEPRO32.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=5,0,4275,1....[ASYCFILT.DLL]..file-win32-x86=thiscab..RegisterServer=No..FileVersion=2,40,4275,1....[STDOLE2.TLB]..file-win32-x86=thiscab..RegisterServer=No..FileVersion=2,40,4275,1....[MSVBVM60.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=6,0,97,82....[COMCAT.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=4,71,1460,1....[version]..signature
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):56080
                                                        Entropy (8bit):6.471892347922079
                                                        Encrypted:false
                                                        SSDEEP:1536:Je/7+7mzLZ9Q6uooPz0OQJ6hbaenpmju6xv50VK/kroRj:JeC7mzl9Q6w09J6hbaop0OK/kroRj
                                                        MD5:267AB17A3526C6C46B2A1CF9A0A51280
                                                        SHA1:A18DDA64D88228D0783D5FF24769FF0375DB1349
                                                        SHA-256:CB535E27870708F94F46ECB75BF6A5DFF17422C28B9F21C2C80AB7B1FCF1F715
                                                        SHA-512:DD462E0DD24940C39EBF843D21DECEDC2CA96FEC3848CDE25218EC9EA45B19A8D559251309240688E981C6915BEC664B6969280E157B00115F13003E60BE430A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{J...$...$...$...%...$..97...$..."...$...$...$.Rich..$.................PE..L...R.C8...........#.........2.....................u.........................0......N...........................................<............................ ......`.......................................`...D.......\............................text...M........................... ..`.data....(..........................@....rsrc...............................@..@.reloc....... ......................@..B4.D8 ...0[.8-...5.D87...........KERNEL32.dll.NTDLL.DLL.ole32.dll........................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):106013
                                                        Entropy (8bit):6.212455176025638
                                                        Encrypted:false
                                                        SSDEEP:1536:M82ThwpbJDIQp4J0O0oRPcHPsw7e2EoFtV6tF3x6WyglF3CT:yTh0bJDIQp4J0O08cHp75kH6pgX3CT
                                                        MD5:0B783914A5BF8CE566C6F7BE36E50759
                                                        SHA1:B72151196A33D73606D20B0265B2D039EF9D1CF2
                                                        SHA-256:A01EA2839B8B9676631CC7D5A9E8D6D64C2CAE5CFBA8D7E74D6E9F4B0E122331
                                                        SHA-512:E863B49D8B1681279D4083EC6AAFC8EE3BB91F81DF4428089219BE616FD66560CC8F97B674B208ABD0566763E27ED5546F9DF9EC7B85B82E17F0376D6B6A07ED
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....B/3...........!.....P...P.......S.......`.....v................................................................p.......k..(....................................`...............................................`...............................text....N.......P.......... ....... ..`.rdata.......`.......`..............@..@.data...4............x..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Windows Installer database, Author: Microsoft Corporation, Keywords: Installer,MSI,Database, Comments: Instala Windows Installer, Create Time/Date: Wed Apr 14 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 2, Template: Alpha,Intel;1033, Last Saved By: Alpha,Intel;3082, Revision Number: {CA04376B-A6BA-F246-20B1-EBD703D8F0D2}1.0.00.000;{CA04376B-A6BA-F246-20B1-EBD703D8F0D2}1.0.00.000, Number of Pages: 30, Number of Characters: 8
                                                        Category:dropped
                                                        Size (bytes):951808
                                                        Entropy (8bit):6.02604379952541
                                                        Encrypted:false
                                                        SSDEEP:24576:T8aSNCmuikMvQVcboqTR/oNsBOozxEAnxEq6UEWtoDbC0snsTSOfWLkLIHt2xNq0:T8aSNCmuiXQVcV/oNsBOozxEAnQWto/l
                                                        MD5:DACAD73CE0EF57276296E89A4F28710E
                                                        SHA1:5E99C052B9D24C8C245632D0691B949F59E19D95
                                                        SHA-256:61AD5E27FC7D0D39E7CBA51C3792F18E6FDC744921E6C416798D8179AACFC32A
                                                        SHA-512:1268D7A180F95847DD0725633E87884D478EBACBF93D11CB7557BF58CDABCF487D8E2D4E36717335983AB81816CB713F04E91E722A4D74CDA7EE34554E4DFED9
                                                        Malicious:false
                                                        Preview:......................>.......................................................p.......j.......n.......v.......t.......k.......g.......................................................................................................................................................................................................................................................................................................................................................................................................................C.......................................................A.......D................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...i.......E...f...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e.......g...h...l...j...k.......m...n...o...........r...s...t...u...v...w...x...y...z...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1927680
                                                        Entropy (8bit):6.128521877107153
                                                        Encrypted:false
                                                        SSDEEP:49152:XCRTdYNHpRTrNHpRTfNHpRTRZzg5UYvn81oq24TVvnN6MatzkEs+qa3URcNoX:Tg5UYvaoq24TVv4MatzkEs+3xo
                                                        MD5:1F4327678ED079D6FE37CBB2679F9B7E
                                                        SHA1:1F5ECF24191E7E40C54354EFEFAC95A21AE91EA4
                                                        SHA-256:56B289A74A0420E0D8BEFF631F1FC34C9F650E1876C2FE2BD7CC715CBAD04C49
                                                        SHA-512:628359DD72B3684C08751E5890A79D11DBF9820A2F9DA706D92DEFDCE7942A09FDD7FC1634F85D99D312A068E05B3C166DD8D4A5F99A7DA6039A94B4A9653C7A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Y...8..8..8....c.8..I.U.8..z.f.8..8~..9..z.?.8..z.@.8..Z.b.8..Z.c..8....:.8..z.B.8..Rich.8..........PE..L......;...........!.........z.......i.......0....@.............................................................................x.......0)...........................................................................................................text............................... ..`.orpc........ ...................... ..`.data....|...0...d..................@....rsrc...0).......*...n..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):83456
                                                        Entropy (8bit):6.31626628635355
                                                        Encrypted:false
                                                        SSDEEP:1536:2eIGSoxLTd4LcE3AeweFR/L0thKAMkIOyMYozY0Cri+tg43wKcQvL6:jIGSoxLTd4LxAen0/Kbk5YozIeOwKcQu
                                                        MD5:E6B975475B001A15B14AE6BDCDE58E45
                                                        SHA1:78E98C30801D2E9FF3005F829B0574CD2B3C2F48
                                                        SHA-256:175435FD486045310E8C393B9B151638756AD14C7C93232BBD9D6920F1268E46
                                                        SHA-512:67957EB32D414E883EDF9D957D9A8783FFD5305E968A046245B79FB7677D5ABEB2651280C9D2117C097BBF53B2A4A10A6B40D5522C4A04F9A0F37D94548C620A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P2...S...S...S...p...S...S...S...p..S...p..XS...p..S...p...S...p...S..Rich.S..........................PE..L......;.....................P............... ..................................................................................x....`..X...............................................................................|............................text............................... ..`.data...T3... ... ..................@....rsrc...X....`.......*..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):297472
                                                        Entropy (8bit):6.293291033170778
                                                        Encrypted:false
                                                        SSDEEP:3072:QA/lZmzljpUKaEU6q+R91vlI2+a1Lnby+0K9RrqfXPQUwyf8gSXlTHM9u3cQKtTP:QA/XIUzEUonvlIrGT0MWfYdbzlbMIkz
                                                        MD5:AB3A6F9B84D4B74F7811A99FB0314A9B
                                                        SHA1:C26185396B46ED706C401A8605CE1BF946AE5CF1
                                                        SHA-256:F7382C1B01B52ABFEF7BD5E7921C2D05E114584255FB1BC17119DBC035C8A008
                                                        SHA-512:1C08854A4240C84913FD925968D838BE25978A58A2D0C59EF46636ED90105FF60CEE047CC58B5B7F555744461095A4CD854F4EB4670BE7870778D743E1D4281E
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........E-.Q$C,Q$C,Q$C,..Z,^$C,Q$B,.$C,...,G$C,..|,P$C,...,P$C,..^,^$C,.._,/$C,..~,P$C,RichQ$C,........................PE..L.....;...........!..............................@..............................................................................................................+......................................................\............................text...c........................... ..`.data....4..........................@....rsrc...............................@..@.reloc...5.......6...T..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):36864
                                                        Entropy (8bit):6.126214350182879
                                                        Encrypted:false
                                                        SSDEEP:768:SSjhX67ianPrIQBpZE/vwsRcL1S2cETJXUl:SS1X67RnUQBXYIsOZS2c4JE
                                                        MD5:47EB6C6EAAAE1544A50339A51A8AE481
                                                        SHA1:7DF0BEB8F719174419D9421497F203D63290F8D6
                                                        SHA-256:3C97927B8BF0BB1A54271D6F117E0E12B673122284B2E382D55237A3487960B2
                                                        SHA-512:A675F471A8404830B114CEC2F0605EF18DCA203B74E2D5A26F3F3A9B0055FF3DAAD45E04AC11FC794E6DF90B9CE700CF39F85E2F2193AF1D13BDE776D3157FCC
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6.jir..:r..:r..:...:y..:r..:...:..D:|..:...:I..:..A:s..:...:u..:..9:s..:Richr..:................PE..L.....;.................|...........I......................................................................................$...x....................................................................................................................text...$z.......|.................. ..`.data...x...........................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Windows application compatibility Shim DataBase
                                                        Category:dropped
                                                        Size (bytes):134164
                                                        Entropy (8bit):5.119567377291569
                                                        Encrypted:false
                                                        SSDEEP:3072:2vbOQXQtrj+jcAxeL9+9sw4vQoZv++lbuSOS+J:2vbOQmOgL9+YOj
                                                        MD5:9A7CA59803DD20AC5C6B900E8665169B
                                                        SHA1:247C0DC1C82F70E6E7F9CAFA9F7C8C69EC4C2648
                                                        SHA-256:AEEC814144D4253D3167360EC6399F542D9123E4D5878808BAC279D6436B3C8D
                                                        SHA-512:DADD8F6023F063F59C0F7703D706218F59F8D54EDFF3CB2CF8C71C67DF22CF6EE32C379DD65C2C69D3FFCF0D84C500737EA294C9CB1126656FB1D6E629F3058C
                                                        Malicious:false
                                                        Preview:....A*..sdbf.xh....x.....8.p.8.`.@......x...VILEBODAf...02MOCUED~...OCHCNERF....OCOTOHPI....RT1002IP....IERUTCIP....VEZILAER....DACOBRUT......YAWNIW&...IUSSKROW>....x.....8.p.8.........F1R..'.r....*c..........n...@............N...p{...4!....k.\o8a.&.........>.+......)...w/........=@i?........=@i?.........ED....q-...I.....qM...I.....q]...I:....q}...I.....g.tWc.L.......s3.`O4......~.'.Xl...Y0.50..YV.......3.i\.....7..AZd.f...K@}...F.....0i........?.3i....2...,.3.....j.....*...........\...6.l.....\...6.......Q. .d......8 ?..H...,....@N.........i*%.B...P...>.......X6...........^^..^!......^^..^!.T....^^..^!.D....^^..^!.6.......L........x.....8.p.8...@...........p..-1..V...U.h.........u.......D.....8.........."a..N..D....H.`T.z........../'2...t=.'.o.+........M..0........9.W1j.......|.GE....qO.2-:.H:...,....I.R....T.kI..SYF...;.Ek..Y......;..nw[d....8..O.f......'.fK.h4...c...I..q....J....z.y....n..g...|......!Y|p.......&Eo....r.......L........eS.....B...&.w........vI!$!E-.H.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):847872
                                                        Entropy (8bit):5.7770113379561385
                                                        Encrypted:false
                                                        SSDEEP:24576:7FrZsyKWdbhmUXE9KIrufRO4t1YF6OWez17:VVhmUXE34t1YFp7
                                                        MD5:1528B3892C7D02CD5BC58DB0736C069D
                                                        SHA1:7B25B7DEC2448CD31D2D029FBB9177D68B0FA107
                                                        SHA-256:AA5A8E2DFA32FD93E56B93F4EE57131EFCAB0C66E822D59DB187410D923EDB6B
                                                        SHA-512:FF9CF44CEE136B5D9854C67F0F05740BBA915B58240F0A9A816DED4EEAE151B4A6C60D0BE650B9E28276DA582FBE1AC22149621CC2599270790E419609EE5CF5
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=.C.S.C.S.C.S.....B.S...n.B.S.RichC.S.................PE..L...U..;...........!....................................................................................................................x............................................................................................................rsrc...x...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40448
                                                        Entropy (8bit):6.0759855839723365
                                                        Encrypted:false
                                                        SSDEEP:768:DvNOtQ6P36XywYpWMbhK5CuInamzP0gEWm4C0HO:rNOK6/6zYpWM0C7namzPFEd0H
                                                        MD5:B5BECF4BDAF9D68ABFFEA2E7F4747265
                                                        SHA1:CCA2DF95690835604BC00E46F39DEA08810DF8EF
                                                        SHA-256:325D9AEECB2E2607ECC43BFCE7E49C2561195158E8A38F366A33CCA5300876C4
                                                        SHA-512:B0828B92849BB6A8E7CF5966C2930502F733C5F6D42787F8873FC1ADB1048A922DE786395BAEABBFE90E30365F29E1698ABEB156B34C3544B692921821DBECF3
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........k.c.8.c.8.c.88@.8.c.8.@.8.c.88@.8.c.8.c.8.c.88@.8.c.8U@.8.c.8.@.8.c.88@.8.c.8Rich.c.8........................PE..L......;...........!.....|...&......Y<............@..................................=.............................. ...8......(...................................0................................................................................text...X{.......|.................. ..`.data...|...........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):167936
                                                        Entropy (8bit):5.9814955021734715
                                                        Encrypted:false
                                                        SSDEEP:3072:sIvjlvPmGwB5RezjIN+vqjo/pFNrk3br+uubhokMD81s2pAFfqCF1hW4HgB/i:sSjpjwOjIN+v30vsVW2pK7F1hW4Hg
                                                        MD5:2CAB9989FB957EFD98DBBBCB9B1946AB
                                                        SHA1:0D01E4AC66D852730D8031A2BCAE215210EA7385
                                                        SHA-256:841FDE9B24476A7ED364A3E4A1470AC9B7358BC92F29FCA4A06AAB557D140850
                                                        SHA-512:92FA2DACE9589789FE2A84E4F561D1DDA32858AEEB4CD13EF73D94D6619A27F68988D653367D0CEB91FBFF8C427D6FF28E8ED0FE00FBA91B006F9FA13F3F9943
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........#..cp..cp..cph.ip..cp8.ep..cph.gp..cpRich..cp........................PE..L......6...........#.....0...@............... .....H.................................=...............................A..Y............`.......................p.......J...............................................................................text....#.......0... .............. ..`.rdata.......@.......P..............@..@.data...@....P.......`..............@....rsrc........`.......p..............@..@.reloc.......p......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28746
                                                        Entropy (8bit):6.545540060601869
                                                        Encrypted:false
                                                        SSDEEP:768:hLCnlsA4wVor2lcvDd2nafVz7aGXdP6YMKdI6C6udCv:h2voo2p2naf9aediYMftdw
                                                        MD5:60D88C0829FE1E16C32F76D71724807B
                                                        SHA1:40FB4D13A643B6F8A7A7CABC2A3F9E48B9E0CC50
                                                        SHA-256:6007DA6BB72FE138DD4AE622C78C5337E3EAF9E8020B748B4A6918563EC988F6
                                                        SHA-512:A8D35023AA60C601B581847E8FA3A1B5E52D5A6515DE6C6EAF7AAFA64CDD6A3BFE6E17281C6870F39343D8D45E2460A8730E8BAA26C24296087BF37ACF55E414
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................................Rich...........................PE..L....aJ9...........!.....d.........................X..............a..................`...............................p.......n..(...............................X...`...................................................T............................text....b.......d.................. ..`.rsrc................j..............@..@.reloc...............n..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):431133
                                                        Entropy (8bit):6.6536949023972145
                                                        Encrypted:false
                                                        SSDEEP:12288:xWNTGm1c2qUkM9nv2VOXRc5uynesaycwrt/cIC:xW8m3qUv9EeROxXcoJC
                                                        MD5:AE5ABEC31518E015A9FB4EB196854291
                                                        SHA1:DEB63ECB2CBC60A688797478A204A2A57F49D1E6
                                                        SHA-256:1C2508FB55DDC459D0327F2017471545C87420443391567094E768FB34032DA1
                                                        SHA-512:DFE3E803AB7940FE4811627832CD048ED872111C3AE6B4DFE3493CB14E7932AFF9B5ACA7E5F387F5B38A44CAFBB350540A4B41955A3D28F36953B01FABCAA2F9
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.Gu...u...u...u...{...,......._...t...u...$...Richu...........PE..L...0.V8...........!...............................H................................................................`...=................w.......................(..<.......................................X...l...............`....................text............................... ..`.data...............................@....rsrc....w.......x..................@..@.reloc...(.......*...j..............@..B4.D80...0[.8=...4.D8G...4.D8T.....+8_...........KERNEL32.DLL.NTDLL.DLL.ADVAPI32.DLL.USER32.DLL.GDI32.DLL........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):63488
                                                        Entropy (8bit):6.659673413793373
                                                        Encrypted:false
                                                        SSDEEP:1536:PETcumoD4VtSnCl2nMdzMdcITmPKhi1fKIaj1/VYcR83:PETcRVtSnUdzMZiFA/VYcR83
                                                        MD5:F8FD9158C6C71F3494A1D469EF78EEA3
                                                        SHA1:747C7D9AA94317B894A77EA903DF959F60282EC4
                                                        SHA-256:68AEFE972833C881857B27BC28D3191234B3C0D73B0F538032DCB82BE3DC4A0E
                                                        SHA-512:D0940A38711DEB93139469863A5B507BE246AFDEDE6195FDD0264490FA4A00A06BB223347316E877B38557FAD5275FFA4384FF58836F54394819800FB140B843
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N..O.h...h...h...K...h...h..Nh...K...h...K...h...K...h...K...h...K...h..Rich.h..........PE..L....};...........!...............................G......................... ......................................P...c.......P...........................................................................p...X....................................text............................... ..`.data...............................@....rsrc...............................@..@.reloc..............................@..B..};(.....};3.....};@.....};M...........msvcrt.dll.ADVAPI32.dll.KERNEL32.dll.NTDLL.DLL..................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):21021
                                                        Entropy (8bit):4.8801661651868615
                                                        Encrypted:false
                                                        SSDEEP:384:L5yAJ3gXLVMYNcJhGCMcrXWpiWwH/sHHgH2nKwsHTWHi5AGsHW0HcHpLHP0oqQGI:0AJ3IMYNcJXMcyu/z
                                                        MD5:B7993C10B9A8C3B9735D7696C7B9E8B6
                                                        SHA1:AC2E765311380BFA502B3B7AED2E8D80C351E08B
                                                        SHA-256:6F0443A62FD444C4254F902F668543B867A0577504915D22CD75328F73CD4472
                                                        SHA-512:D17AE76467F5FAC056494A0FDEF445A5BBB1F633507DDEF9B2AFC12DD47EAA68096784D47E968383B207382850100EF1915378E74564E29CBE1C8E0D422DD679
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q{J...$...$...$...%.'.$.L97...$..."...$...$...$.Rich..$.................PE..L...q.^7...........!.........0...............0.....u.................................................................'..k....(..X....@...+...................p..P....,......................................`...4....................................text............................... ..`.data........0......."..............@....rsrc....+...@...,...$..............@..@.reloc..P....p.......P..............@..BM.^7....N.^7%...........KERNEL32.DLL.ADVAPI32.DLL.......................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):314906
                                                        Entropy (8bit):6.170788306003831
                                                        Encrypted:false
                                                        SSDEEP:3072:10EvBHYN6cpZbdPYxDhjnYnMq182s8Vvh0VCPL2zHoytG5dHJZE5d8wfI:1LHYwcLdy9Ir6v8tS8ytG5dHL+pI
                                                        MD5:4437B4E1EFC79C331070B9F481E3E97A
                                                        SHA1:793B1D0839912679CB43E50B63C186205B8B7D44
                                                        SHA-256:4D8FF1F53C3BABF9BFD11B2EBCD44E2698CFE3BC80C6F0CBC64C0D191EA1FC1B
                                                        SHA-512:C82CEA06778426943958E47A8A3372731A3834C412F919E1E6C35B7FE41DD55E3E6D881CD489464A69FD65180A4B1632527C0B06E62700F5C66BF4867089A7CD
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............................................Rich....................PE..L...0.C8...........!.........................@....ef.........................@....../^..............................@9.......1..d............................ ..p...`...........................................l.......`............................text...]-.......................... ..`.data........@...>...4..............@...Shared..P........0...r..............@..P.rsrc...............................@..P.reloc....... ......................@..B4.D80...0[.8=...4.D8G.....+8R...4.D8\...........KERNEL32.dll.NTDLL.DLL.USER32.dll.GDI32.dll.ADVAPI32.dll........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1353504
                                                        Entropy (8bit):6.674591083664776
                                                        Encrypted:false
                                                        SSDEEP:24576:sff3GymQgwTKYZe9YNTUPTBAS5m0WrSu/CScsOE:EmjtTT6S5ro/CzsOE
                                                        MD5:F7FF3D6E5359DA5243D7889D3200E32B
                                                        SHA1:6B4B02BBE68B09DF0D0CD680ECB56DF6C7F4463C
                                                        SHA-256:69DD649F0D3A05149E048EE216F8F68D8B81AE32473EF511A144C99352FCA960
                                                        SHA-512:9B11E90E0C50826EE571C3B6AA7D039AAD4B18481619404D3E578A41585214943FFC8C2A551E2B883C7C4F3544635A1BF5DF178F94B654C63F11E7ABF494B69E
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.....................v.....................Q....................................................................R......."6.......Z...........P.. W... .........................................................\.......^....................text...H........................... ..`.itext.............................. ..`.data....O.......P..................@....bss....|S...P.......*...................idata.."6.......8...*..............@....didata.^............b..............@....edata..R............l..............@..@.rdata...............n..............@..@.reloc...... .......p..............@..B.rsrc....Z.......Z..................@..@.....................P..............@..@........................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):56080
                                                        Entropy (8bit):6.471892347922079
                                                        Encrypted:false
                                                        SSDEEP:1536:Je/7+7mzLZ9Q6uooPz0OQJ6hbaenpmju6xv50VK/kroRj:JeC7mzl9Q6w09J6hbaop0OK/kroRj
                                                        MD5:267AB17A3526C6C46B2A1CF9A0A51280
                                                        SHA1:A18DDA64D88228D0783D5FF24769FF0375DB1349
                                                        SHA-256:CB535E27870708F94F46ECB75BF6A5DFF17422C28B9F21C2C80AB7B1FCF1F715
                                                        SHA-512:DD462E0DD24940C39EBF843D21DECEDC2CA96FEC3848CDE25218EC9EA45B19A8D559251309240688E981C6915BEC664B6969280E157B00115F13003E60BE430A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{J...$...$...$...%...$..97...$..."...$...$...$.Rich..$.................PE..L...R.C8...........#.........2.....................u.........................0......N...........................................<............................ ......`.......................................`...D.......\............................text...M........................... ..`.data....(..........................@....rsrc...............................@..@.reloc....... ......................@..B4.D8 ...0[.8-...5.D87...........KERNEL32.dll.NTDLL.DLL.ole32.dll........................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):106013
                                                        Entropy (8bit):6.212455176025638
                                                        Encrypted:false
                                                        SSDEEP:1536:M82ThwpbJDIQp4J0O0oRPcHPsw7e2EoFtV6tF3x6WyglF3CT:yTh0bJDIQp4J0O08cHp75kH6pgX3CT
                                                        MD5:0B783914A5BF8CE566C6F7BE36E50759
                                                        SHA1:B72151196A33D73606D20B0265B2D039EF9D1CF2
                                                        SHA-256:A01EA2839B8B9676631CC7D5A9E8D6D64C2CAE5CFBA8D7E74D6E9F4B0E122331
                                                        SHA-512:E863B49D8B1681279D4083EC6AAFC8EE3BB91F81DF4428089219BE616FD66560CC8F97B674B208ABD0566763E27ED5546F9DF9EC7B85B82E17F0376D6B6A07ED
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....B/3...........!.....P...P.......S.......`.....v................................................................p.......k..(....................................`...............................................`...............................text....N.......P.......... ....... ..`.rdata.......`.......`..............@..@.data...4............x..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Windows Installer database, Author: Microsoft Corporation, Keywords: Installer,MSI,Database, Comments: Instala Windows Installer, Create Time/Date: Wed Apr 14 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 2, Template: Alpha,Intel;1033, Last Saved By: Alpha,Intel;3082, Revision Number: {CA04376B-A6BA-F246-20B1-EBD703D8F0D2}1.0.00.000;{CA04376B-A6BA-F246-20B1-EBD703D8F0D2}1.0.00.000, Number of Pages: 30, Number of Characters: 8
                                                        Category:dropped
                                                        Size (bytes):951808
                                                        Entropy (8bit):6.029627921240929
                                                        Encrypted:false
                                                        SSDEEP:24576:A8OSNZmfikMhQccboqT+/+NsBGozxEEnjEq6UEWtoDbC4snsTMOf2LkLIHtuxPqC:A8OSNZmfiZQcc6/+NsBGozxEEn+Wto/X
                                                        MD5:2B4B94ABE5C6B89A47F212C2D696D618
                                                        SHA1:15DF612410AC2D576D069DF94B306066D15D60F3
                                                        SHA-256:3900B678DE6D24DB7ED9D7190517C60793B9B435EC58BBE46AAD044A49CAF636
                                                        SHA-512:0311EAC11B1FE3A3AE6420F46534A420E70C3C8D2BF05D5E754DFDB480722D28E97732AF0E25890AF22C3FAC1CE01ED008886E22445C37E9894ED76FEA76850A
                                                        Malicious:false
                                                        Preview:......................>.......................................................p.......j.......n.......v.......t.......k.......g.......................................................................................................................................................................................................................................................................................................................................................................................................................C.......................................................A.......D................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@.......B...i.......E...f...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e.......g...h...l...j...k.......m...n...o...........r...s...t...u...v...w...x...y...z...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9178
                                                        Entropy (8bit):6.934013526787076
                                                        Encrypted:false
                                                        SSDEEP:192:nC1zR7DDb5qikTvpTKaErlnkTN2+goPKJ54Kn4dFR+4Db:ArAChe1nDj+Yb
                                                        MD5:C74C5092222CA8B7C32B3423B22DE3A0
                                                        SHA1:3EF6BE0BBF482EB3D026247B31B1A0DADBC1C71F
                                                        SHA-256:4B3A1258638737EE338885DFF62256AA747A08BFC738C4A9850477B4AC7462EB
                                                        SHA-512:3059D6BE46BFCBBAC148C5A6E20D9EF5512F2F5B5EC0BE5970C1E34FE73EC81D01D5D54F9CB6DBAECBD0ECC8F7A89D031E9D173D5A6925EC0FF89FFA1601B0AD
                                                        Malicious:false
                                                        Preview:0.#...*.H........#.0.#....1.0...*.H.......0.....+.....7......0...0...+.....7.....(..GN..F..*....W..010818054031Z0...+.....7.....0..j0..&.R0.2.4.8.2.9.8.3.6.D.D.0.C.B.1.0.9.8.0.F.E.E.E.C.1.E.1.D.C.1.A.C.6.3.A.0.B.0.8.4...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........H).m...........c...0....R2.4.7.C.0.D.C.1.C.8.2.F.7.0.E.6.E.7.F.9.C.A.F.A.9.F.7.C.8.C.6.9.E.C.4.C.2.6.4.8...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........$|.../p......|.i.L&H0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0..&.R3.7.0.F.D.A.0.E.C.9.4.3.3.B.2.6.E.4.A.B.3.C.8.5.C.0.4.3.0.4.0.7.A.5.3.4.A.2.E.8...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........7.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1991168
                                                        Entropy (8bit):5.8958492897713075
                                                        Encrypted:false
                                                        SSDEEP:24576:GB7Nqm40TSJvanFIrEegExvhiwtqeBf4QASo0u7kHRwuVkdLURWs:GB7dSJvanedlxEwtq+sr7KVyLURF
                                                        MD5:5A6627C42F40199CABBF11391E141928
                                                        SHA1:43D97D4DA87D15C7FD96D95F9BFC90C3CEBF8A91
                                                        SHA-256:860E1B58DE5FCB3DBC7DCD9A16C5FAA56C748DA24C69A05417C75CD40E4432D3
                                                        SHA-512:F63401AB3650EF3CB5DE8F419807E3C3825F3CF68DA39A13C084A3DFA562BA77E7993F99B2E83AE2CED4D95D763AA49BB3D3228C07048BDB2654CD3767A6EE8D
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........I....................................%.......%......%.......................H......%.......Rich............PE..L.....};...........!................\~.......0.....w........................................................................$...........H)..........................p*............................................... ...............................orpc............................... ..`.text........ ...................... ..`.data........0...l..................@....rsrc...H).......*...v..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Windows setup INFormation
                                                        Category:dropped
                                                        Size (bytes):1116
                                                        Entropy (8bit):5.322486389930819
                                                        Encrypted:false
                                                        SSDEEP:24:podajIZRTvvD6SxJre7OI+g/5xCYUf4QOSNWU4KugU5IvDGfjbIDSFSxJSbcexJJ:4aUTzSR5WvWNJgwIKbIDSY2bce2S
                                                        MD5:FB6D53A80B79EEF39A6EE32DC35EF9EA
                                                        SHA1:59A11A3EF985F9F776D5908F0A11910BB749CD5D
                                                        SHA-256:95CC7C6E3797E544516B952442888D6A000FEF7B339997EC8ADDB7F180DF6D7E
                                                        SHA-512:E29268033177E88693385847EEA2A2118943B3848A552E3A9B2629106F41644F82C78AE6CAD2CFEBE34D70D7F7212E3411687E32094E9D469EA74409C32346E1
                                                        Malicious:false
                                                        Preview:[Version]..signature = "$Windows NT$"..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..Provider = %Microsoft%..CatalogFile = msi.cat..ComponentId = {2E742517-5D48-4DBD-BF93-48FDCF36E634} ; GUID assigned to the Windows Installer..DriverVer=03-13-2001, 2.0.2460.1....[SourceDisksNames]..1 = %msi_media%....[SourceDisksFiles]..msi.dll = 1..msihnd.dll = 1..msimsg.dll = 1..msiexec.exe = 1..msisip.dll = 1....[DestinationDirs]..Msi.SystemFiles = 11 ; %windir%\system32..Msi.DllCacheFiles = 11,dllcache ; %windir%\system32\dllcache....[DefaultInstall]..CopyFiles = Msi.SystemFiles,Msi.DllCacheFiles....;..; COPYFLG_REPLACE_BOOT_FILE flag (0x1000) not necessary for..; files in the dllcache..;....[Msi.DllCacheFiles]..msi.dll..msihnd.dll..msimsg.dll..msiexec.exe..msisip.dll....[Msi.SystemFiles]..msi.dll,,,0x1000..msihnd.dll,,,0x1000..msimsg.dll,,,0x1000..msiexec.exe,,,0x1000..msisip.dll,,,0x1000....[Strings]..Microsoft = "Microsoft Corporation"..msi_media
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):63488
                                                        Entropy (8bit):5.818017231218899
                                                        Encrypted:false
                                                        SSDEEP:768:rI4YSbqG4TY4LkR2Jcwuoc7NokgteLVyNlKludccVor3whUOyZWCTRpmaBVVG:x4TY4LCj+c7NIGVybKluS3YnyQCyaB+
                                                        MD5:E7A49533944654EDD82D26338DF0FD05
                                                        SHA1:573E88D79B4359D4314A3DB71928730BD018FDB5
                                                        SHA-256:9E251671385941E2ADA9AA40811F1BA1E876E40A70C81AFAE1F88D18D80D0FEB
                                                        SHA-512:5C7933E4F1D4329380F22C9FED907041295DBD9D91CDDAC20961924614AA944ED6641915D0777DB0BB0C55B6C097EC51C10A21096C6C098E2EFE6B84219A5BD9
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S[b..[b..[b...A.._b...A..Pb..[b...b...A..Tb...A..Zb...A..Yb...A..Zb..Rich[b..................PE..L.....};.....................H............................................... ......y9......................................<...........h...........................p.......................................P...........T............................text...^........................... ..`.data....*..........................@....rsrc...h...........................@..@..};H.....};S.....};`.....};m.....};w.....};m.....};......};............msvcrt.dll.ADVAPI32.dll.KERNEL32.dll.NTDLL.DLL.USER32.dll.ole32.dll.msi.dll.....................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):304640
                                                        Entropy (8bit):6.29099735641058
                                                        Encrypted:false
                                                        SSDEEP:6144:NT/c7YrGE4VUDbJIFo4791yrsd4DtTnnhV7d:q7YrGEJqLzotTnh5
                                                        MD5:E7F00952494BA4D9545242514614844A
                                                        SHA1:8AC8A0228698E562C1B1592177662611ABEF144C
                                                        SHA-256:DA4192B9B0A0C3A1BE1F1E52E2A4CC4BCF11B8436B04D0AE8118EF84FC4F6D34
                                                        SHA-512:5FAA7518B5A4C33797C0D43D7C884D408351507B7223698DEF313AE23DAABE8B9B10DB58F86939D054CB5DADE6FCA525EBDC84E26D97FCFD42866D9EF9B179E2
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6..W...W...W...W..ZW..Wt...W..Wt..W..Wt...W..:t..W..wt...W..wt..,W..Wt...W..Rich.W..........PE..L.....};...........!................]..............`........................................................................(....................................+..........................................x...........t............................text...c........................... ..`.data....8..........................@....rsrc...............................@..@.reloc...5.......6...p..............@..B..};P.....};Z.....};P.....};g.....};t.....};....2.};......};......};............ntdll.dll.KERNEL32.dll.ADVAPI32.dll.USER32.dll.GDI32.dll.COMCTL32.dll.IMM32.dll.SHELL32.dll.....................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):50688
                                                        Entropy (8bit):5.935720802852158
                                                        Encrypted:false
                                                        SSDEEP:1536:NB9UO9nZK+ISiSoPSLljX1FEiZ3ZmcmIHv:NB9U0nZKQlNR7Z3gcmIHv
                                                        MD5:41C714021C92086E80B0B57DD1E634FB
                                                        SHA1:60F86C8CE8FA4BEA23D7CA4C4F01E33D63B5990C
                                                        SHA-256:A6F1B26EEB1DE06F319BBE0F5E4BED4AF9C708A9D4F3E574EEA924B29EBD5001
                                                        SHA-512:81C4D3B826F2F715E03EDF2C65DBB9F00990B5A8FA40EEF5531FE1B656CF5DBCF5A45A86E8A903980C07624B84841F34597C716067FE5CC662AD69ED5CBD09A7
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................l.............l.....L.............L......l......Rich............PE..L...m.};....................."......Cj..............................................j:..............................................................................0................................................................................text...h........................... ..`.data...8...........................@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Windows application compatibility Shim DataBase
                                                        Category:dropped
                                                        Size (bytes):134164
                                                        Entropy (8bit):5.119567377291569
                                                        Encrypted:false
                                                        SSDEEP:3072:2vbOQXQtrj+jcAxeL9+9sw4vQoZv++lbuSOS+J:2vbOQmOgL9+YOj
                                                        MD5:9A7CA59803DD20AC5C6B900E8665169B
                                                        SHA1:247C0DC1C82F70E6E7F9CAFA9F7C8C69EC4C2648
                                                        SHA-256:AEEC814144D4253D3167360EC6399F542D9123E4D5878808BAC279D6436B3C8D
                                                        SHA-512:DADD8F6023F063F59C0F7703D706218F59F8D54EDFF3CB2CF8C71C67DF22CF6EE32C379DD65C2C69D3FFCF0D84C500737EA294C9CB1126656FB1D6E629F3058C
                                                        Malicious:false
                                                        Preview:....A*..sdbf.xh....x.....8.p.8.`.@......x...VILEBODAf...02MOCUED~...OCHCNERF....OCOTOHPI....RT1002IP....IERUTCIP....VEZILAER....DACOBRUT......YAWNIW&...IUSSKROW>....x.....8.p.8.........F1R..'.r....*c..........n...@............N...p{...4!....k.\o8a.&.........>.+......)...w/........=@i?........=@i?.........ED....q-...I.....qM...I.....q]...I:....q}...I.....g.tWc.L.......s3.`O4......~.'.Xl...Y0.50..YV.......3.i\.....7..AZd.f...K@}...F.....0i........?.3i....2...,.3.....j.....*...........\...6.l.....\...6.......Q. .d......8 ?..H...,....@N.........i*%.B...P...>.......X6...........^^..^!......^^..^!.T....^^..^!.D....^^..^!.6.......L........x.....8.p.8...@...........p..-1..V...U.h.........u.......D.....8.........."a..N..D....H.`T.z........../'2...t=.'.o.+........M..0........9.W1j.......|.GE....qO.2-:.H:...,....I.R....T.kI..SYF...;.Ek..Y......;..nw[d....8..O.f......'.fK.h4...c...I..q....J....z.y....n..g...|......!Y|p.......&Eo....r.......L........eS.....B...&.w........vI!$!E-.H.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):847872
                                                        Entropy (8bit):5.777004388495094
                                                        Encrypted:false
                                                        SSDEEP:24576:yFrNsyKWdbhmUXE9KIrufRO4t1YF6OWez17:KZhmUXE34t1YFp7
                                                        MD5:0695F0F7008EB5F5B389ED0E57089BDF
                                                        SHA1:16C1EFC321761DA9A082DA756ED9D1AADF9CA246
                                                        SHA-256:FA4106578D9B3C425AB992B0877CBE1D60A05493CBF46FB21ECA89E5D468A0A8
                                                        SHA-512:2F2AB3A4498ADED3E76A9DF0765E8390A9BB9F9D3E1500D1B8DD3679CA22E882C323492AC576DC185B9B6581FCBFFB1233A6E97CBB2BC33501A6C0C0E80725DE
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=.C.S.C.S.C.S.....B.S...n.B.S.RichC.S.................PE..L.....};...........!..............................q`...................................................................................x............................................................................................................rsrc...x...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):39936
                                                        Entropy (8bit):6.201920535107619
                                                        Encrypted:false
                                                        SSDEEP:768:6Gxnz2TWfL8g3/2RVjoOPeHd4xKQ7m4d05hgl36:nxzdfLn3ug8eHd4R0fgl3
                                                        MD5:91E27CBCEB6ADDCFDF0D1E7D1A3AD339
                                                        SHA1:17D489C003355A34197C84BE37ED393BB9BFF2D3
                                                        SHA-256:DEC5542F2A19FF58AF26B1E30A80D2628AC8FBA9D8569A867F1C8529EB209F8E
                                                        SHA-512:58FC549A3953456F4149582288B35F98D72231FF06E34E633A3DFD77FCBBC5F9C2C8B864F02E32259B0D6AAEAE72F860CD3CD6739134424FB3447044F62E83F0
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............c.,.c.,.c.,8@.,.c.,.@.,.c.,8@.,.c.,.c.,.c.,8@.,.c.,U@.,.c.,.@.,.c.,8@.,.c.,Rich.c.,........................PE..L.....};...........!.....z...&......(;............_`.................................c..................................8.......(................................... ...........................................0....................................text....y.......z.................. ..`.data................~..............@....rsrc...............................@..@.reloc..d...........................@..B..};......};%...........KERNEL32.dll.NTDLL.DLL..................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):167936
                                                        Entropy (8bit):5.9814955021734715
                                                        Encrypted:false
                                                        SSDEEP:3072:sIvjlvPmGwB5RezjIN+vqjo/pFNrk3br+uubhokMD81s2pAFfqCF1hW4HgB/i:sSjpjwOjIN+v30vsVW2pK7F1hW4Hg
                                                        MD5:2CAB9989FB957EFD98DBBBCB9B1946AB
                                                        SHA1:0D01E4AC66D852730D8031A2BCAE215210EA7385
                                                        SHA-256:841FDE9B24476A7ED364A3E4A1470AC9B7358BC92F29FCA4A06AAB557D140850
                                                        SHA-512:92FA2DACE9589789FE2A84E4F561D1DDA32858AEEB4CD13EF73D94D6619A27F68988D653367D0CEB91FBFF8C427D6FF28E8ED0FE00FBA91B006F9FA13F3F9943
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........#..cp..cp..cph.ip..cp8.ep..cph.gp..cpRich..cp........................PE..L......6...........#.....0...@............... .....H.................................=...............................A..Y............`.......................p.......J...............................................................................text....#.......0... .............. ..`.rdata.......@.......P..............@..@.data...@....P.......`..............@....rsrc........`.......p..............@..@.reloc.......p......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28746
                                                        Entropy (8bit):6.545540060601869
                                                        Encrypted:false
                                                        SSDEEP:768:hLCnlsA4wVor2lcvDd2nafVz7aGXdP6YMKdI6C6udCv:h2voo2p2naf9aediYMftdw
                                                        MD5:60D88C0829FE1E16C32F76D71724807B
                                                        SHA1:40FB4D13A643B6F8A7A7CABC2A3F9E48B9E0CC50
                                                        SHA-256:6007DA6BB72FE138DD4AE622C78C5337E3EAF9E8020B748B4A6918563EC988F6
                                                        SHA-512:A8D35023AA60C601B581847E8FA3A1B5E52D5A6515DE6C6EAF7AAFA64CDD6A3BFE6E17281C6870F39343D8D45E2460A8730E8BAA26C24296087BF37ACF55E414
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................................Rich...........................PE..L....aJ9...........!.....d.........................X..............a..................`...............................p.......n..(...............................X...`...................................................T............................text....b.......d.................. ..`.rsrc................j..............@..@.reloc...............n..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):431133
                                                        Entropy (8bit):6.6536949023972145
                                                        Encrypted:false
                                                        SSDEEP:12288:xWNTGm1c2qUkM9nv2VOXRc5uynesaycwrt/cIC:xW8m3qUv9EeROxXcoJC
                                                        MD5:AE5ABEC31518E015A9FB4EB196854291
                                                        SHA1:DEB63ECB2CBC60A688797478A204A2A57F49D1E6
                                                        SHA-256:1C2508FB55DDC459D0327F2017471545C87420443391567094E768FB34032DA1
                                                        SHA-512:DFE3E803AB7940FE4811627832CD048ED872111C3AE6B4DFE3493CB14E7932AFF9B5ACA7E5F387F5B38A44CAFBB350540A4B41955A3D28F36953B01FABCAA2F9
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.Gu...u...u...u...{...,......._...t...u...$...Richu...........PE..L...0.V8...........!...............................H................................................................`...=................w.......................(..<.......................................X...l...............`....................text............................... ..`.data...............................@....rsrc....w.......x..................@..@.reloc...(.......*...j..............@..B4.D80...0[.8=...4.D8G...4.D8T.....+8_...........KERNEL32.DLL.NTDLL.DLL.ADVAPI32.DLL.USER32.DLL.GDI32.DLL........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):72192
                                                        Entropy (8bit):6.449616021144991
                                                        Encrypted:false
                                                        SSDEEP:1536:R+XuzhVtdQKdeHAonHjKN7TtKIn+UT+eSIdzw2ah6lLd0O:R+XuzhVtdQKd9GOd/+eSm6h67F
                                                        MD5:552F387180800CDEA023DC65E2F62416
                                                        SHA1:E0E76E9D224157FA9D1B83A1533B049103EEEBBE
                                                        SHA-256:55AA0917FD64607FEDC6AD71DEE75E333C23DC283342205880F8F66DEDA269E6
                                                        SHA-512:144E4EB61E932BC33EBBA9DCCB5D3A450EA7E1B63C54B459F47CD1CC0A5178C545DE16FD5D3E3F1A3861BCE56C9FD7D4DB457DD4A1A744A06FD255C3E0DEA1F9
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.5...[...[...[......[...Z.T.[..B...[..d...[.......[..G...[..f...[.Rich..[.........................PE..L....};...........!........."......^..............G.........................P......7...............................0...c.......P.... .......................0......P...........................................L.......P............................text............................... ..`.data...............................@....rsrc........ ......................@..@.reloc.......0......................@..B..};(.....};3.....};=.....};3...........msvcrt.dll.ntdll.dll.KERNEL32.dll...............................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):21021
                                                        Entropy (8bit):4.8801661651868615
                                                        Encrypted:false
                                                        SSDEEP:384:L5yAJ3gXLVMYNcJhGCMcrXWpiWwH/sHHgH2nKwsHTWHi5AGsHW0HcHpLHP0oqQGI:0AJ3IMYNcJXMcyu/z
                                                        MD5:B7993C10B9A8C3B9735D7696C7B9E8B6
                                                        SHA1:AC2E765311380BFA502B3B7AED2E8D80C351E08B
                                                        SHA-256:6F0443A62FD444C4254F902F668543B867A0577504915D22CD75328F73CD4472
                                                        SHA-512:D17AE76467F5FAC056494A0FDEF445A5BBB1F633507DDEF9B2AFC12DD47EAA68096784D47E968383B207382850100EF1915378E74564E29CBE1C8E0D422DD679
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q{J...$...$...$...%.'.$.L97...$..."...$...$...$.Rich..$.................PE..L...q.^7...........!.........0...............0.....u.................................................................'..k....(..X....@...+...................p..P....,......................................`...4....................................text............................... ..`.data........0......."..............@....rsrc....+...@...,...$..............@..@.reloc..P....p.......P..............@..BM.^7....N.^7%...........KERNEL32.DLL.ADVAPI32.DLL.......................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):314906
                                                        Entropy (8bit):6.170788306003831
                                                        Encrypted:false
                                                        SSDEEP:3072:10EvBHYN6cpZbdPYxDhjnYnMq182s8Vvh0VCPL2zHoytG5dHJZE5d8wfI:1LHYwcLdy9Ir6v8tS8ytG5dHL+pI
                                                        MD5:4437B4E1EFC79C331070B9F481E3E97A
                                                        SHA1:793B1D0839912679CB43E50B63C186205B8B7D44
                                                        SHA-256:4D8FF1F53C3BABF9BFD11B2EBCD44E2698CFE3BC80C6F0CBC64C0D191EA1FC1B
                                                        SHA-512:C82CEA06778426943958E47A8A3372731A3834C412F919E1E6C35B7FE41DD55E3E6D881CD489464A69FD65180A4B1632527C0B06E62700F5C66BF4867089A7CD
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............................................Rich....................PE..L...0.C8...........!.........................@....ef.........................@....../^..............................@9.......1..d............................ ..p...`...........................................l.......`............................text...]-.......................... ..`.data........@...>...4..............@...Shared..P........0...r..............@..P.rsrc...............................@..P.reloc....... ......................@..B4.D80...0[.8=...4.D8G.....+8R...4.D8\...........KERNEL32.dll.NTDLL.DLL.USER32.dll.GDI32.dll.ADVAPI32.dll........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):290816
                                                        Entropy (8bit):6.551645416298201
                                                        Encrypted:false
                                                        SSDEEP:6144:sP1hcYD9DDW+j8PPk/axspmqPugvLRyoVLNMIrZO:sPPZ9Dq+oPkwspm2+uO
                                                        MD5:DFCEEBC9D6DBB3DB56B735C7020A35D1
                                                        SHA1:189F681C860D15E997F3ED4502D747F25656BAC1
                                                        SHA-256:09687C007B9D0C4047BC42C58C54E6DB62B9614306AC6DCBCD1B7532CF5ACF17
                                                        SHA-512:15E73EFE925572ED9FDD11C316255880F7F131BEE084121B28B8507AB88E95FC22CDB9D606481CA499BD2BFDB61E871A2F026CEC56F5B747388237E3FB752351
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......'"..cC.OcC.OcC.OcC.O.C.O.\.OkC.O.\.OeC.O.\.O.C.O._.OvC.OcC.OfC.O.c.O.C.O.E.ObC.O.c.ObC.O.c.ObC.ORichcC.O........PE..L...K.j9...........!................G0.....................................................................................`...x....@.......................P...8...................................................................................text...R........................... ..`.rdata..............................@..@.data...............................@....rsrc........@....... ..............@..@.reloc...?...P...@...0..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):49152
                                                        Entropy (8bit):4.387373720474639
                                                        Encrypted:false
                                                        SSDEEP:768:hMVuR2oP0u6XsofBidHI/X/K3amL0N8YEeRFJRLtt+5l+s:hM4vM9XSryD33t+is
                                                        MD5:FA2FA874B44742422A3FF24C0B0FD197
                                                        SHA1:7B6788715EC613A3C6BDE749FAB28CAB22C615A4
                                                        SHA-256:269957304D54C9EAED58FC26DEEC3F0A3AB44A17D2291C1B3B252436A3A10080
                                                        SHA-512:E3E29467903C41891023673FA7193F2ADCE59A79AB8A1C0819DEC7E71B8F4C3CC1357299B3762E376B76DAA6B53A5F34DFED69B7ADBEB37F10969BAF1EF123FE
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 2%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................N....................2......Rich...................PE..L.....)X...........!.....p...@......T................................................................................o.......j..(...........................................................................`... .......0............................text...Y`.......p.................. ..`.data...............................@....rsrc............ ..................@..@.reloc..6...........................@..Bl.[J............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):610304
                                                        Entropy (8bit):6.2640254765203
                                                        Encrypted:false
                                                        SSDEEP:6144:WuvRsZJVIlB7FXdo6h4JOyXztOLVbC3ZtEVQ71L9UvsY42L/ZEmq79Hozkf:Wu5jn26hLLNCptjpS6ya
                                                        MD5:FC877611E178FA17E23F99D9694590A0
                                                        SHA1:5B9E15F716F4D32CA249E5A81D4739F20BBC276C
                                                        SHA-256:A09132479BF9D6EC78448688986984C66973434FA0C92DC7406C0FBCBF522F33
                                                        SHA-512:3D83907D60ACB074FA2DA454F4FA598E190F354804C4C7C8E2D5E54D03493BEFFCC31D8BBD8C2112B05A776D30B8DD7F92F0585704C3078040CA71EE0CE3968F
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........%Ga.vGa.vGa.vGa.v5a.v`..vJa.v`..vBa.v`..vXa.v`..vha.v`..vFa.v`..vFa.v`..vFa.vRichGa.v................PE..L...In$I...........!................@.............{..........................`............@.....................................................................Tc..................................h...@............................................text............................... ..`.rdata..............................@..@.data....%....... ..................@....CRT................................@..@.rsrc...............................@..@.reloc..nd.......p..................@..Bo.[J@.....[JK.....[JX.../.[Jb...~.[Jm.....[Jz.....[J............msvcrt.dll.KERNEL32.dll.NTDLL.DLL.USER32.dll.ADVAPI32.dll.ole32.dll.OLEAUT32.dll........................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):217088
                                                        Entropy (8bit):5.770430998285837
                                                        Encrypted:false
                                                        SSDEEP:1536:1nV7hrLWSPhPXkkMuvcxIxqW6utdvM6M:DhXjJ0kpEysuz
                                                        MD5:30BF99F06F5611B31C507271F9FF864D
                                                        SHA1:1B3A0E066AA172E56C0D027152AF3030AB6F7F82
                                                        SHA-256:AE7AD9EF03FC7BF37DAAFB0E36959C587533DF07808B7CC2B7970651F6B34394
                                                        SHA-512:C2A0880802DF23B694D6A6219E5C0646C10339555930CF2A60E2B52E8DFA0AA2B7B835C2761B43D8D40256E44DBAA8DC53BA062229AC7E9D64B7C1E317E4BB9A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........f..........&......%.....$....Z'....Rich...................PE..L....B.C...........!................t".......................................P.......n......................................d{..(........S......................`9..........................................`... .......\............................text...8r.......................... ..`.data...............................@....rsrc....S.......`..................@..@.reloc..N@.......P..................@..B.$.>............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):4.8812124598826285
                                                        Encrypted:false
                                                        SSDEEP:768:lU0gWrY5CAKGMsEcfUy5Nv0SNOHWRV0KqNukmdM2yxZyIJ56ZZnl:vMs8O2RV0i45m
                                                        MD5:6A961C35752F5917B10E5A4390838F89
                                                        SHA1:01F79863059372E76467100FFFDDB73A1E33C087
                                                        SHA-256:A9D7EE5FBAD27EAAD0878F2C29A47EBE3D25E246E1758895E12179963146CF19
                                                        SHA-512:FB6AB0EC85D0FD2DE6159F6CA1FE49B3B759D3142BFBCC78D236AD386307F6914D043825CDAD4E8E52EEBF0D578F5E8259F0EDCB90C50D4F1DFF2F3B9EDF8A1C
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........f..........&......%.....$....Z'....Rich...................PE..L....M.@...........!.........@......4...............................................#Z..........................................(...........................................................................`... .......p............................text....~.......................... ..`.data...H...........................@....rsrc............ ..................@..@.reloc..............................@..B'.};............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):132600
                                                        Entropy (8bit):5.764106197379897
                                                        Encrypted:false
                                                        SSDEEP:1536:Vf/gAB2/w4M8BYaAVPwOC/1pT8D8gQ3hjjpCp788CuS2y29i8p5pX6SmFXn44:9o9//VBfOCtLfpCl2uLg8zpXp2nJ
                                                        MD5:3484FD2B93B9720DE9E09E04630F6786
                                                        SHA1:A538294DDA5314407434F421ED8DD9E22C4F052B
                                                        SHA-256:C5491E88680F291F8BCE5F6CF3D0AAF05348AD6B041C1AEE390FA69C42071CE8
                                                        SHA-512:8E98169B6C68ED0CECD094404D0D5909DC4AB2EA5F31C6A023048A2F29F28819BA32ABCE75C1DFE43E752E6C7979EB967DBF66A13CD3BD902159A51DA9222D05
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........AN. .. .. ..<... ...).. ...-.. .~.$.. .Rich. .................PE..L...+.zF...........!.....@..........L........P......................................=...............................@C......t;..(....`...k..........8.......................................................`... ....................................text....3.......@.................. ..`.data...|....P.......P..............@....rsrc....k...`...p...`..............@..@.reloc..6........ ..................@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):49152
                                                        Entropy (8bit):4.588173828979497
                                                        Encrypted:false
                                                        SSDEEP:768:hHmFNJBa5eAimsRsrf+y5cxSK8Vsdc6xUzKi:dmFnBa5sm5cxS3McKUOi
                                                        MD5:C546CEC8F4C0EDE2F51EEDC7CE5DC564
                                                        SHA1:A2C0D484E50ADB0B757CFD34CB12B678F4614986
                                                        SHA-256:1B0B1848DC8EF5F60B812F405D4CDA43F67566155FB8F229A7B3E3EA1ECFBDBA
                                                        SHA-512:62664E8A3A493A301E5D8DF250542EB8D5F23F8074814135D712AC9D8F7AA0BDE0A09505FD745C2F4EEB81EDB8159E57D15ED21B39A7541AE1F95CCD2A652930
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i~..i~..i~...b..h~..&\..k~..m]..h~...^..h~..Richi~..................PE..L....@.Q...........!.....p...@......(................................................o...............................v.......q..(...........................................................................`... .......(............................text..._g.......p.................. ..`.data...............................@....rsrc............ ..................@..@.reloc..............................@..B...E............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):144888
                                                        Entropy (8bit):5.640141676664818
                                                        Encrypted:false
                                                        SSDEEP:3072:9JshFryVlQMhtRu/O+NXGF1CRBgQYMWY7WnM:5lQMhPu2+wF1oaQYc
                                                        MD5:E0458E23FA5B2852F1B88F487B0C916A
                                                        SHA1:C71B9769E677434A473ADE1126D04E9CEFEBFBD8
                                                        SHA-256:96D981A8269BFA3A183CD0963FEC841373C08A97C34E35A05123D50547DEB1A6
                                                        SHA-512:8564BAD65232F7D2524417A5942C099C9A467AD86544EB6006D247B893F7AB9034A65C4059CD99C72466BE6E41AC5EAC0CBE96DCA77EE7919629D66D576BAC7A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Q..Q..Q....P.....W..g..P.....P..RichQ..........................PE..L...+.zF...........!................H.............Bu......................... ......W8......................................$...(.... ..............8 ..............`.......................................h... .......T............................text...(........................... ..`.data...,...........................@....rsrc........ ....... ..............@..@.reloc........... ..................@..B..:@............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.5243719406147602
                                                        Encrypted:false
                                                        SSDEEP:96:R5XacropfVAbDWmqXUv+lzoY9W2+xiRfhDbRIQYcvEYmotqYC1hoa:NrCmbDBqXw+hbWM1aQDmYC1J
                                                        MD5:6D669FC0192A4F685147B5C7BCF637CD
                                                        SHA1:ED0FECDD48D49645C89CF23056F9310EEA0BB23C
                                                        SHA-256:3F75A0AC5BECFB33C9CC0312B486D45BCD528992FD6EABA7FA7A1539FC7F4F49
                                                        SHA-512:2E23EA333461FE9110E2FA6F83214BA9C83C002EB3CBFF53CB13A30E44619526D00A8ECD87089DEFCED83947D90726BE5687BC4A9B09C07CCC2333A8299C10DA
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........OD..*...*...*..2$...*...+...*.~. ...*.~.!...*.F(,...*.~.....*.Rich..*.................PE..L....Y.:...........!.........@......!........ .....@.........................`.......................................!......` ..(....@.......................P....................................................... .. ............................text............................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc........@.......@..............@..@.reloc.......P.......P..............@..B.$.>............MSVCRT.dll......................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5042233
                                                        Entropy (8bit):6.348947882126544
                                                        Encrypted:false
                                                        SSDEEP:98304:WJdA7Kn4uYmR88wV1s8dxnve1RZ3BUE9nPdf9avG37EuY:WJy7OymLH8dhg3jPdWGLO
                                                        MD5:2517D67C02B04B3D07FEF74501D6E303
                                                        SHA1:8FE46EFC7F3810358F31AC45B87BB54F08C4FFFE
                                                        SHA-256:A1B0116C01EFB841A263DF2A7BA261FB1B131169C0974E90383535F90C704C83
                                                        SHA-512:3032B05A178BA384693A02AC221B394CA3FDA60D7A0EB2D4039A31C527721FF458A1E486CC0C32834E35A3A2D3F4EF0237368D7E5F084267327EB650239CD3E1
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.........."..q..q..q..q..q...q..q..q..q..q..q..q..q..q..qn..q..q..q..q..q..q...q..q...q..q..q..q...q..q...q..q...q..q...qb.q*.q..q...q..qRich..q........................PE..L....t.?...........!......4.........#.2.......5...............................M......................................J<..j..l.<.......?......................I..^..`.5...............................................5.T.....<.@....................text...>.4.......4................. ..`.rdata..E.....5.......5.............@..@.data.........<.......<.............@..._CODE....*....>..0...@>.............@....rsrc........?......p>.............@..@.reloc..".....I...... I.............@..B................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):2.6466214442096905
                                                        Encrypted:false
                                                        SSDEEP:192:soGk2GtWbZ97gEjWzhQEjIhNFeI59g2jQ66FupdS:soGk2LZ97qljIhNFeW9g2jQ66s
                                                        MD5:B86749B441E49EBD58141871DA7F8DD7
                                                        SHA1:83C1D25B2D2803CAB684ECB6F36F2FEAEB79EB4A
                                                        SHA-256:492C644DBEBB7999EA02E2F2CB562C41D1BB10296BCC72900A59F2CA4D5090B4
                                                        SHA-512:84DFF0CEA5E6239090AD3797F5062A1F54DA16FF2387998C415A01C175266F9127CC4A123ECBE98DADD4940E125DCD7A08FF9993DC4B671FF058BC251C6DA5FE
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.a./k../k../k...w...k..rI..+k..rI..-k../k...k..Mt..*k..pI..,k...m...k...K...k..Rich/k..........PE..L...B.|:...........!..... ...@.......$.......0.....@.........................p.......)...............................3.......0..P....P.......................`..................................................D....0...............................text............ .................. ..`.rdata.......0.......0..............@..@.data........@.......@..............@....rsrc........P.......P..............@..@.reloc.......`.......`..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):54784
                                                        Entropy (8bit):4.791159064203773
                                                        Encrypted:false
                                                        SSDEEP:768:7ZulXt12qM+Tgi3Y9iRJfeYIegQQmF6if4oQ:7ZulZTgio9e5eYIegQ1m
                                                        MD5:C703D97D68033A2DD0B6EBE3CCD3C196
                                                        SHA1:69E86AA066A0CA260D28149B151ACC4C318DF9B5
                                                        SHA-256:8E61E4714BEEC40A5062023038B86B1258129EDDA39B73CDCA71916E0941CF56
                                                        SHA-512:882B67E0B8F7A9F276D2430DE92E3C2811BC3D557FC07085F48D513B73B032EED02F0319B15A86BD8E83B3A99A70D24287860EF9CE848CC92F44684CBCA8948E
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....B..................................... ....@..................................................................................0...............................................................................................................text............................... ..`.bss......... ...........................rsrc........0......................@..@.idata..............................@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):245760
                                                        Entropy (8bit):5.1770781573052425
                                                        Encrypted:false
                                                        SSDEEP:3072:hzjb+IRc8dAzofC+Tuna7ac2SGumAN4nphB:hzjb+T5+B2Sqxh
                                                        MD5:010CA532E3A09F1755500ACCCA93D966
                                                        SHA1:641B201FE8871A5256607E2EFA4505FE3C43C468
                                                        SHA-256:72FA78FC7B8E99726FF1B6B77E30A290750324FC50758A42DC50F48D8CB0CAE8
                                                        SHA-512:5631B7DCEC43E32FF31F843B14B12A7F29E6530BD80240B87E5AB49180150B95CE57420028BC32BC3640A656AEA149846E41B7598AEF84889609CE4531B1606A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=...y.q.y.q.y.q..|.x.q...u.x.q.Richy.q.........................PE..L...p.T@...........!................x.............GD................................................................p...........(....... .......................D2..........................................X... ....................................text... ........................... ..`.data...<...........................@....rsrc... ...........................@..@.reloc...2.......@..................@..B'.};............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):3.124598839033411
                                                        Encrypted:false
                                                        SSDEEP:192:LJ2lGLpG+9B8Rzg1auG+i3OeJrcTtWrgwx9r+jCNFeOp5m:LJ2l69Y4a6eJrUtWrgS9r+jCN3Y
                                                        MD5:347E011F0164DB9CFAC6BB066BAADEC0
                                                        SHA1:116E90AD2358FC31F0C9F86035895BFE9A55A8AE
                                                        SHA-256:67263AF5AD1B9E0CD7A9088B8BA0CA2D05995E73F6E2ADBDDABD53E075BA9533
                                                        SHA-512:707FA48E83BF497540A8D688975D8A885E005ABA321C179BDD95B123573786BBB29E4CB176D46291E945068D8EFE6047C393E6303F925ADC2F64F9CF551912B9
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1=..u\x.u\x.u\x..@t.w\x..@v.t\x.u\y.[\x..Ck.|\x..|s.w\x..|r.p\x.Z~.t\x..||.v\x.Richu\x.................PE..L....Y.:...........!..... ...@.......*.......0.....@.........................p.......<...............................4.......0..x....P.......................`..................................................l....0...............................text...0........ .................. ..`.rdata.......0.......0..............@..@.data...d....@.......@..............@....rsrc........P.......P..............@..@.reloc..,....`.......`..............@..B.$.>0....v1?=....$.>H....$.>U....$.>a...........KERNEL32.dll.USER32.dll.comdlg32.dll.SHELL32.dll.MSVCRT.dll.....................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.8691527276214883
                                                        Encrypted:false
                                                        SSDEEP:96:2IIUH5yvzjhJe5klNxxL3bU1ogumEoQTbbQBCxYmotqDNhoUN:2Ih5yc5klNxxL3boRumErQcDN
                                                        MD5:9CECBCFF995CF75B752130D3137D39F1
                                                        SHA1:6893B2B9F32E12E16F2F5C5D9CBEC3E603B4EEED
                                                        SHA-256:3CCC9887261965B99EC0F2751D3D3096F2E31CBF281E7EA1A9902C814985DB9B
                                                        SHA-512:DB464E70B3141248B3E63449F15D3CD9937F81207B6E32878AAF570FE7B027E1651061F808AA9670017A00B3694824061F06F03E3F446423A633C892AB08C638
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........?...Q...Q...Q.j._...Q...P...Q...B...Q...Z...Q...[...Q...W...Q...U...Q.Rich..Q.................PE..L....Y.:...........!.........@............... .....@.........................`......................................."..6.... ..P....@.......................P..................................................D.... ..T............................text............................... ..`.rdata....... ....... ..............@..@.data...L....0.......0..............@....rsrc........@.......@..............@..@.reloc..b....P.......P..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):225280
                                                        Entropy (8bit):5.724903191036286
                                                        Encrypted:false
                                                        SSDEEP:3072:q54c1n/ypBau8j3dzRTGT2Idm2tbBu5Y6obbliT/mV:q54vaBtzRTf2Bgmb4TmV
                                                        MD5:F122F3946E0C78A8782BA78153E0A4DB
                                                        SHA1:2932A0217CF396C3EA1D0014E09D24BA7FD6DFD7
                                                        SHA-256:33F3970E1C14EDC4962F8394CA7A30F619516EE6A89535DDDF31017EB084DB69
                                                        SHA-512:15EC323EAA5B1D2863B4AC50A21BCB4647B08A776F7A3C981CCEFB4F0CB6E628A305C060721D0C5494BFDF557706D7415ADD88E5FF6C87B4F0E1F2C83F42B3F4
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@ .w.A.$.A.$.A.$.^.$.A.$Yc.$.A.$.].$.A.$Yc.$xA.$f^.$.A.$.A.$wA.$[c.$.A.$[c.$.A.$.G.$.A.$.a.$.A.$Rich.A.$........................PE..L.....{:...........!..... ...`.......{.......0.......................................a...............................O......xF..d....@.......................`..................................................l....0...............................text............ .................. ..`.rdata..:$...0...0...0..............@..@.data...Q....`.......`..............@....rsrc........@... ... ..............@..@.reloc... ...`...0...@..............@..B.$.>0....$.>=....v1?G....$.>R....$.>\...........KERNEL32.dll.NTDLL.DLL.USER32.dll.GDI32.dll.comdlg32.dll................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):221184
                                                        Entropy (8bit):6.073107874518051
                                                        Encrypted:false
                                                        SSDEEP:3072:KegzPMHKTjDd/fW+uTASAnjAmqvgvks5eXIm2099RX9O+84IEo5lDNy:hAP0KbdXUAFgZsqImx9OGfo59
                                                        MD5:E1DCB4C37FCCD79578F1B8E376D1B3F6
                                                        SHA1:9351C62C6302F62049485E4C15BA909B8E902C08
                                                        SHA-256:A3186DDE55B8F897C5D953F986B4F0A77797E9617609909C49DA6F3E285AE4B5
                                                        SHA-512:F5D34E397B5075603384DA42A8617A46834C696720B8B71D3E1384EF6B368422E785127165F34F71A92413980DB510BDD72F24D89E7FAC7C65ED3CE251C36A7B
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........P...1.R.1.R.1.R.-.R.1.R...R.1.RI-.R.1.R...R.1.R...R.1.R.1.R.1.R...R.1.R...R.1.R.7.R.1.R5..R.1.RRich.1.R........PE..L.....=...........!.........................................................`......................................`.......p........ .......................@.......................................................................................text...5........................... ..`.rdata..o........0..................@..@.data...............................@....rsrc........ ... ... ..............@..@.reloc.......@... ...@..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):69632
                                                        Entropy (8bit):5.117727805431737
                                                        Encrypted:false
                                                        SSDEEP:768:ozUIYk6zTsTKPGfysb5s6fNFJRX6Esq10h:ozUft+asb+6flJA
                                                        MD5:6357561041ACA8C2DDB47819F864D583
                                                        SHA1:C487E183366C43C98623ED9BD6197C400CA6A231
                                                        SHA-256:5882978A3CF04C47E7C1B81A55FDE27DEB45D6009F85BF318A97AA9D95D8686B
                                                        SHA-512:DEDFB7C921473E3644D29F65BF1A7CE6EA9F2A6EE9B8C272645536278C24C79976EA8876FE3F1817C90DE18ED27BCF1999EA15E37507D11A41D7208C4425723F
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i~..i~..i~...b..h~..&\..k~..m]..h~...^..h~..Richi~..................PE..L....flD...........!.........P......@................................................;.........................................(...........................................................................`... .......X............................text............................... ..`.data...P...........................@....rsrc............ ..................@..@.reloc........... ..................@..B.$.>............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):100352
                                                        Entropy (8bit):6.01574608255945
                                                        Encrypted:false
                                                        SSDEEP:1536:W0/GIQTIfT9Q2qEB+Jk3gC7UfPnJQBJHl8UPif4xStOgkM:NGg98fC43nuBBGU+4
                                                        MD5:59B610DF85409A13832B9B5B807DA4FE
                                                        SHA1:FADFCE97D3D9F6935D5F6A4ACA53232D733AB4C6
                                                        SHA-256:369C08452CE18AA2894442F63C524C4F8DB416F12D86E624099BE61DAD9F2F98
                                                        SHA-512:117D144807C1BC38858859F8417CE69597FDF3B3FAF28D5567ECA58A84CBAC292C87EB54840E8DAC9A0F3CD66F755CE8CB31BC30D78B01A47B09FAA1C2C8B73C
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Nb#P/.pP/.pP/.pP/.p./.p.).pQ/.p.3.pL/.pRichP/.p........................PE..L....V.7...........!.................$.......0.......................................[..............................p5..f....1..d...............................................................................X....0...............................text...P........................... ..`.rdata.......0......................@..@.data...xt...@...D...*..............@....rsrc................n..............@..@.reloc...............p..............@..BN_.P(.../.[J5.....[J@...4..NJ...........KERNEL32.dll.USER32.dll.GDI32.dll.MSVCRT.dll............................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.965175828785223
                                                        Encrypted:false
                                                        SSDEEP:192:xGqtPxX4u8XuBxGkkUiRh8jJmmj2sucQgeh:xGqdSP4xPibOMm/Qgeh
                                                        MD5:7BBBE3749D17CD539623C60F5E023992
                                                        SHA1:E0769AEA1E7EC30DD33AC022E8C1D0F79983BE36
                                                        SHA-256:D8F7E302FD89ACD8EE36FAA07214ED3B6039F91EC45F72FC954967C04FE906FF
                                                        SHA-512:86AEC1D8FC59DD7B8F86815928196798FD6C0288B331B552298CDD157025B7BD3CD9ED84C0A07D4B3D5ED347AC0B2944931AEC9FA15D9ABA1DDFC8796619AE40
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...ir..ir..ir...n..hr..ir..Nr...m..lr...R..kr...R..nr...t..hr...R..jr..Richir..................PE..L....Y.:...........!.........@............... .....@.........................`.......!..............................."......h ..P....@..(....................P..................................................D.... ..h............................text...~........................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc...(....@.......@..............@..@.reloc.......P.......P..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):69632
                                                        Entropy (8bit):3.5687827741608045
                                                        Encrypted:false
                                                        SSDEEP:1536:ZWJaaymHs15LBdFElh9aaaD+FdhaG9AFqg24CHgSz+Qar:ZWJaaymHs15LBdFElh9aaaD+PUG9AFqQ
                                                        MD5:E8C7545574E4D9E9992CB5B9331271CC
                                                        SHA1:CF271D3B4A88DA069E61D1269DC8EE412695C69D
                                                        SHA-256:14A788E493779B3FD96C1F94D7154642E79F34594B978A6A7E39C97BEC5F7E5B
                                                        SHA-512:F4A5E5D7F2D162260F150E4F3069F707E0D3C291E0766720E813F5A40D410A67AC18DC03ED5DC7B5DF579A8A3BFCA4F5EF667D16733B853D11104F0C7F165E90
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L......:...........!.................................................................................................................................................................................................................................rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):2.744540447798788
                                                        Encrypted:false
                                                        SSDEEP:192:X/62KJlTcY9alIW9avJMdVxWH/Y9VP0QCKFYOpf:X/62EcY9JEavOdVxWHQ9VcQCOT
                                                        MD5:7C94ECB0391127848A8F20AFA8FD63F6
                                                        SHA1:53B7FC88913CAB7E4E030504E58DFDA87E395ED1
                                                        SHA-256:BE4C2FE0AF5612C91EAE9AB4D67F5276C46963FACE2D5B734BE7E40B382B7332
                                                        SHA-512:1AF94DE58B00BE9F49046A0EC5A326957B00550DF5E9F7359CF97FFAF219540C98EBEEA10EEF8CEE7388D4690C9B322624D48962F4628D4D65852D07AE9C1BDF
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................@......<......................................<.......Rich...........PE..L...D.5<...........!..... ...@.......'.......0...............................p.......................................4.......0..x....P.......................`.......................................................0...............................text...`........ .................. ..`.rdata..X....0.......0..............@..@.data...T....@.......@..............@....rsrc........P.......P..............@..@.reloc.......`.......`..............@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):3.769486670952223
                                                        Encrypted:false
                                                        SSDEEP:384:6P8c5PrzxQK07hKTQhbXETATDluQXE8m:6Pz5PrzxQKYkUhb2AnluaE8
                                                        MD5:6BA1EF4DB1C4430CEE386B60D38B7935
                                                        SHA1:DF42C4E61714457EEDFEE488769B0983D3CD0865
                                                        SHA-256:7E6234E69BF794F27A67B936911F4540A994673F5CB746F767F4CE0E4DB55A09
                                                        SHA-512:A9AB00275E19299F3B44F1000F0AF3ACA009CD9D043D0236D3B05E15F66177DC56EBCABA45151D980D5B5A99F1A3542781A8BF809E90EB1399373315649CB7BB
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k!../@../@../@...\...@..`b...@...f...@...`...@..Rich/@..................PE..L......B...........!.....0...0...............@...............................p.......................................;.......8..(....P.......................`..............................................`... ....................................text...],.......0.................. ..`.data...\....@.......@..............@....rsrc........P.......P..............@..@.reloc.......`.......`..............@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1009336
                                                        Entropy (8bit):6.46634380726448
                                                        Encrypted:false
                                                        SSDEEP:24576:hlXNkkmkDgQPnYVGEDc9u3WiZZRUKTX44gDk:LXNBmkDgmnYVBDcoZ4a
                                                        MD5:C80389E4872A0885CBB14FD3641166AB
                                                        SHA1:B0B125C77E62FF50EE34896D4F11B3EB6E798D84
                                                        SHA-256:A281C15CBDE263D4D0DA4A78FD29F861473B68464051E591E57DD693E2E68DD4
                                                        SHA-512:9C4AF367AD39ED7D9E630367C0BDC163C61F0E1410645E0EF63198CE4AC5357EA28399C05B8489FD2E852AADA414BD883AFB2ABF859B79F2E6A802CE183E5A6A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...qy.8.....|.....#.....B................... ....I(........................................................................@........ ..............Q..........X...@1...............................................................................text...p@.......B.................. ..`.rdata.. ....`.......H..............@..@.data...l....@......................@....idata..............................@....rsrc....... ......................@....reloc..X...........................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.057730216921513
                                                        Encrypted:false
                                                        SSDEEP:384:+Q80x006bw+FkZQ47Jx4j6uX6yzd54gEvtyFvb01ij2ZJQiz/AoN9s0KJb8:+QP6bw+GyOij6850Abj6/Qiz40KJ
                                                        MD5:9FDB8A72D927888796A4E6A14560CC5F
                                                        SHA1:ED49DCFE5FD16C658033373D816E61D8173368A3
                                                        SHA-256:E692AB331FA5753D619B5FBE68BD5AC44C57AD13D046048414F75CFDE4065A19
                                                        SHA-512:040358819A95AC368E1A67523B409E7E18C1D37444B03A14BF346F5C9183B8743D4F97011C0C5AE177B2BEC8AAACC687416B9A6ABBC2D692CC2307DD0B56C1C2
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=...y.q.y.q.y.q..|.x.q...u.x.q.Richy.q.........................PE..L......=...........!.....P...P...............`.....4.................................................................U......tS..(....p...)..................................................................X... .......h............................text....E.......P.................. ..`.data........`......................@....rsrc....)...p...0...`..............@..@.reloc..............................@..B'.};............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.1158608664095375
                                                        Encrypted:false
                                                        SSDEEP:384:o0a2aB9b6YzTIy2EdQicNtkjmxHSxb/SI9mviJ4zZ95ewFkK492/T:o0aBBMGMy2EdQicNpR2SiqzWQ/T
                                                        MD5:1AF1B68553F1D5D59158727F6EB49DBB
                                                        SHA1:7386BEAE5AC29E8240F7C1D651F1B0D09B535957
                                                        SHA-256:006D43D8400DD964907D0797A9B9E29A8A8964C11BAD3E7A0E35DBE0DB0506D8
                                                        SHA-512:336C996DDC17F8A7AB39486C6980C88F113B96A672D7243B2971850D3055DC767ED285457374D9B5CEBDAD3BFAA56F7D4774222C7B0CA5D2D63B079B9D354D80
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........cu......................................................!......H.......p"......Rich............................PE..L.....c>...........!.....P...@.......O.......`.......................................................................g.......b..d...............................d....................................................`...............................text....@.......P.................. ..`.rdata.......`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):18728
                                                        Entropy (8bit):4.5595763568254295
                                                        Encrypted:false
                                                        SSDEEP:384:lilrpyGufzrUBnv45HxA0wid3qiMmQ28C2:lilFylzrUBnA5Hw
                                                        MD5:07934C956B971F10B7F73D55239AB976
                                                        SHA1:50C8C3E4C01546B5A51D27BF780E1B3219C802CD
                                                        SHA-256:4C63DD877BF263ED2AD5C2EFCF92FEECFAB1C7037583D3DD70C91A04BD30E506
                                                        SHA-512:D439BE4AEBF674937B5512381D0BBBF1127D785B290DB4CD50DB3D667E9CEA6A1E4741610E3F7AA67C1927ED1F1B0CDC309602480461210B91B645D37F80E961
                                                        Malicious:false
                                                        Preview:MSFT................A........... ...................Q............... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...........................................................................D................... ...............................t...........X)..P............,..............h-..0............-..0...........................................................!!...-.............................................. ...............................................!...L...h...X.......................................0...............................................!.......4...,.......................................D............................................... !..................................................\...............................................!!.../..h...X.......................................p...............................................#!..\/..........................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):409600
                                                        Entropy (8bit):5.896273828906067
                                                        Encrypted:false
                                                        SSDEEP:6144:zUv6aVWzjnY5Cpbe1i3irndYi1PN2Ba1NQoy4ky:UVWzjnY5CpoprDsBa1Ntky
                                                        MD5:E9214CA4A0BBDFC7CAAA8DF4E21DCA65
                                                        SHA1:00CA85B3130278B4E9140DEF8E3F67BE445D8542
                                                        SHA-256:264A1CC8D3C4852C9D2F09E22EAE30BF81C1D388F7CC7EF1CD46DA425BD642B1
                                                        SHA-512:85EE59B8E54D8E1D884EE05F0ED77C4ABBA9AC476D5615FCD4E75AFDF0C93BA8F1C21FD1D0B68D075FE32B04A28283839078AABB0189921F9B7EEB6B76CFD41C
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+..J...J...J...V...J...h...J...l...J..nj...J..Rich.J..........................PE..L...q..\...........!..... ...................0...............................@......?...............................@,.......$..(....@..8........................b..........................................h... ....................................text............ .................. ..`.data........0.......0..............@....rsrc...8....@.......@..............@..@.reloc...m.......p..................@..Bl.[J............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):106496
                                                        Entropy (8bit):5.19516961379927
                                                        Encrypted:false
                                                        SSDEEP:1536:gw/iTp1rZP6UpbRfOdkWY+o9uLtOpaYlga+gi4+m6bnStQgc:A1lSUTf2YhatKJogi44nStU
                                                        MD5:1EDC1124D987025B4539C6CCD86FE52C
                                                        SHA1:76C6558A038714C0671BE517DC3FAA47A9804BCA
                                                        SHA-256:54EC7365B4C8AF951C0447493D6D0A32CCBE9C1139CAE4D2252D44DC7B1B8E6F
                                                        SHA-512:18EE07CBAA4A443AD8B61E89BA0E466C065B7BFBE5E14258F280E2C3DD266B0D9F78C0C5580C0F2E3EC3A502D9F7A4AE3A38543F0C8B8178E85EA3C9290CCA72
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............H...H...H`..H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H(..H...H...H$..H...H...H...HRich...H........PE..L...4.v=...........!................;................................................................................:..e....2.......P..@....................`.......................................................................................text............................... ..`.rdata.............................@..@.data...T....@.......@..............@....rsrc...@....P.......P..............@..@.reloc..x:...`...@...`..............@..B........................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):1.807152052248964
                                                        Encrypted:false
                                                        SSDEEP:96:5qsN56E9EADBVzBDaZBcG6fyXmuY+eQ5TMbKGbMH7x6sTFw+YprWUUsmn+sWiNBg:5qP1ADhAZXmuY+LubKRc6smh7
                                                        MD5:859751A660914A75FB9062E47B7111B5
                                                        SHA1:741752CECE787A377987A3C329238E87B1AEBBAE
                                                        SHA-256:7DDDB9C0D38C2BC47EA44B0B5F73A1A6411BC0069AFD4B42AECD79C92D1666FE
                                                        SHA-512:8D8D3278111BCEA19781A3523F863B378BDA40D8AB580775CE6664F080777E5F83C4F0EAA42A98363A0842F6DE9FD47CEDB1AE5DD42AC5D04BB046A6213A4F94
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L...E.j9...........!.........@...............................................P..........................................................X!...................@.......................................................................................rsrc...X!.......0..................@..@.reloc.......@.......@..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):8096
                                                        Entropy (8bit):4.112479782177178
                                                        Encrypted:false
                                                        SSDEEP:96:xZg7aPZBVJYko6ayMa4iBJAaiuPh+tefhFyr9YkheQWg8YilYb97PTwU26QLll2:xJGb6rx3JAAjZFyYIIg8tmR7r06QLll2
                                                        MD5:21699843C3F8594D68263645ECE51DD3
                                                        SHA1:5F6A4AE01CBC09A70C5A47F003E39A3B3C23544D
                                                        SHA-256:4CAB84B86D92EA0807F436459E6F6B8F8834AC1013EB1004C3C88A5F57BF8B96
                                                        SHA-512:72DF305F6D1D8D0FFBA24244485F2EA39EC76D3DEE7AA812A4FFB0DC0F2FE55E17E04D01A14270182B7F107524863D38342E68CAC1518ECCC1DE8861326DA0F2
                                                        Malicious:false
                                                        Preview:MSFT................A...........................c................... ...................d.......,...........X....... ...........L...........x.......@.......................<...........................................,................... ...........$...............$...`...............$...........................................................................................................!!..0...............................................................................................!!......h...X.......................................(...............................................!!......h...X.......................................<...............................................!!..<...............................................P...............................................&!..................................................`...............................................&!..................................................x...............................................!!......
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):102400
                                                        Entropy (8bit):5.440036346891534
                                                        Encrypted:false
                                                        SSDEEP:1536:1rKnUevheUuLzGUT842VxV40Zi8ooiWC:QtZ6LzLgxhooiW
                                                        MD5:D6AC6D930525ED743418E29802510BBB
                                                        SHA1:F4AD2AE3E144F6BD1E103DF5E40654EEAC29A728
                                                        SHA-256:06228AC38A5052A9430195B1D00546B05E23D0EBE4E93F6E0364D14282369DC4
                                                        SHA-512:DE41F832F2EB4BDA0C158FEFAD0C0DB9170736A0DF916773286564FADC7E32F1713024CCD4EE8DEF3658F4612AF933DF1A8B6FA312B4B92B5F79E9670C864B05
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Xz.z...)...)...)...)...)...)...)A9.)u..)A9.)...)...)...)~..)...)...)...)...)...)C9.)...)...)...).;.)...)Rich...)........................PE..L...B.|:...........!.................~.............@...............................................................`.......x...d....`..........................................................................l....................................text...z........................... ..`.rdata..8........ ..................@..@.data....N.......@..................@....rsrc........`... ...P..............@..@.reloc........... ...p..............@..B.$.>0....$.>=....$.>J....v1?T....$.>_...........COMCTL32.dll.KERNEL32.dll.NTDLL.DLL.USER32.dll.GDI32.dll........................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):152848
                                                        Entropy (8bit):5.88912905338292
                                                        Encrypted:false
                                                        SSDEEP:3072:VCslb9HnH/GrQ/qCFyn7dWXSQeRDBIY/OR5JrNo2CocrJbNN6N2TRqEydc:VCsB9Hu9nweRD4JZoDxtRHj
                                                        MD5:AB412429F1E5FB9708A8CDEA07479099
                                                        SHA1:EB49323BE4384A0E7E36053F186B305636E82887
                                                        SHA-256:E32D8BBE8E6985726742B496520FA47827F3B428648FA1BC34ECFFDD9BDAC240
                                                        SHA-512:F3348DBC3B05D14482250D7C399C00533598973F8E9168B4082EE5CBB81089DFAEFCFDA5A6A3C9F05B4445D655051B7A5170C57EE32D7A783DC35A75FEE41AA9
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:@...........#......................... ....z!.........................0......(I...............................q...............@...............:...............................................................................................text...L........ .................. ..`.data........0.......0..............@....rsrc........@.......@..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):45056
                                                        Entropy (8bit):3.954164176068831
                                                        Encrypted:false
                                                        SSDEEP:384:qi9tF0bg81ZrH7b34Fu2NFuYNFD5Gl8m369SLQJ9yuFpzDt:qiXKbgWrHH3KuIuYzol8m34yuTzD
                                                        MD5:F61DC6C03816ED80201D25FBBB30FED1
                                                        SHA1:3AA785941B1FF7A880228248F94148718FC47146
                                                        SHA-256:5CDC8ADB1C10223A4C3AF25BB192E2FD47F8E83539714661AD4A6FCABB47F163
                                                        SHA-512:E802DD73A1CA937004B3A47E00FF75B744BB2B00A962559684FA01AFBDFC40C3ED4755BC8B5ACA1C57B9A5075B0FB39B1FBB3DD875D5A4F2CB6A88B4CB4BFDEB
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y........................W.....B.............Rich..................PE..L..../;...........!.....P...P.......O.......`......................................................................ph.......a.......................................................................................`..8............................text....@.......P.................. ..`.rdata..-....`.......`..............@..@.data........p.......p..............@....rsrc............ ..................@..@.reloc..<...........................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1032192
                                                        Entropy (8bit):6.101428802921911
                                                        Encrypted:false
                                                        SSDEEP:6144:CtAHN82uQEooHGt5iJATXUyMTlyfkFvV7MRIdKfjidfGdpb4W:ssuQtHt8JAiFvV4RO9G7
                                                        MD5:958010BB6090C998DBD84279C5A115EE
                                                        SHA1:53295D5498C7BB60B285F86D327264E526CB8034
                                                        SHA-256:D1936FB2D6D9F13DE68A423870931D1467BD6DC6115D55579DF84E6F9CC90FB8
                                                        SHA-512:42A44A32F60A58CB45B8B05299A9EB2C0C945A248B59641ADA7396BB4C8C64D2D04130066CECEB51A23E2AD2A55971FC07766EAF9D281F5F87E438BE2E5E54B0
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B............6.......................J.......Rich....................PE..L......\...........!.................Y..........................................................................................(.... ..`Z.......................#..........................................`... ....................................text............................... ..`.data...............................@....rsrc...`Z... ...`..................@..@.reloc..~@.......P...p..............@..Bl.[J............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1213936
                                                        Entropy (8bit):6.347694185622386
                                                        Encrypted:false
                                                        SSDEEP:24576:CjKrC6GOC5tmhsG3Ikjhd+guqUvM+EoOoSSWKWm3ld0Wd8P/b+M7nchgQNpo/4oe:y6GOC5tmhsG3Ikjhd+gu9EoOpm3kWdII
                                                        MD5:ADCF2B08D824BFEE8E022403DA1B6351
                                                        SHA1:7E675B66DAC9DE781AABFD7A5F24FF00832363B3
                                                        SHA-256:89D6303A7725CE4A39417ECA498EEEAEDC286747004002853C6D49D4589B506F
                                                        SHA-512:DE3E0A28D920FB5206DD86AFE0ABD02F835F04F73828CBE73B6D1B613B5ED565FE479CE3898CF56612E8457AE1F4ECC651B028000E0FE4F239C4BFFB0A15F430
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~.;...h...h...hY..h...h.=.h...h.9.h...h%?.h...hRich...h................PE..L...&.zF...........!.................\............R................................................................. .......t...(.... ..............0p......................................................`... ....................................text............................... ..`.data... 1..........................@....rsrc........ ......................@..@.reloc..............................@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):167936
                                                        Entropy (8bit):6.187995719559416
                                                        Encrypted:false
                                                        SSDEEP:3072:RiT9Mjz9fxT8ms8xHZaKV6AORqrkcNnVn6u7OtP:RvfxFHZdYOk4nVnf
                                                        MD5:56A8FDC2477954D863C92D08675FFE57
                                                        SHA1:00E91FC7856C20F05E7203CE3BA72F2F0F78BEB2
                                                        SHA-256:B39FE18BFA62BA1A2F1D680B3505100448F3CB3ABE49B6D55B3DFFDF430E25BE
                                                        SHA-512:233379A84A523A890E593C7550344CCA982E18A5F5A91B42209304279CD0F0798AEC67D9BC897769A537C2DB617E9A2210EB5A5E1A0E6C388AC0A70CE8A40FD6
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................%....Y..........Y.....a....Y.....Rich...........................PE..L...E.=9...........!.............................n(.................................................................................`.......................p..X....................................................................................text...r........................... ..`.rdata..sf.......p..................@..@.data....+...0...0...0..............@....rsrc........`.......`..............@..@.reloc.......p... ...p..............@..B................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1077344
                                                        Entropy (8bit):6.342928728513251
                                                        Encrypted:false
                                                        SSDEEP:24576:dnt4M/pL1wAEIqSBanK6CC33VTj+1R8xRFLqqmbD1kWIAqKU:dPL15EIqS1e6q3FmKbtL
                                                        MD5:774A15583DB1AD44C5EE32309C840C96
                                                        SHA1:B3F80B06AD6283FC021DE1682772C22DD6F2436B
                                                        SHA-256:E1058530566AAEDF7D529A394F18E8540D8F6106F57381D2DD431AFF99951F8C
                                                        SHA-512:01070B6DCB28E4AC8E1D2C3B44F882E85249D6F00DF58229ED938592CB7355613BD88F649664AC9E5EE2F8328F578BCA0C4A14B1F1904D372AAFD1F7464CBA86
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r..<.....@.....#.........j.......9.......p....X'.........................P....... ...............................E...............P...Z...........V..`............................................................................................text...H........................... ..`.data....s..........................@....rsrc....\...P...`...P..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):270336
                                                        Entropy (8bit):6.270731532321854
                                                        Encrypted:false
                                                        SSDEEP:6144:shwrCzCaYgTe2I3J1un3m6fdjR4vAkGh+:shwmPrI3u3pd9kAM
                                                        MD5:A14947F6BA9E75C5E5C2263157E886CE
                                                        SHA1:0E39F13BEC51D6CB2F1CFF3F35660B0A2E3C4F40
                                                        SHA-256:E43F008E7E57BACDD29E02570C4728B720BA2D11D9D269FCFCA54C875715ABF8
                                                        SHA-512:B7CA2D08D9D5C9D1374CF541BFFF5AC87C2D5C82857AEF1B84BA6307A5157B192AABA62BE399B2B25AAE5176D39E198625A1CBB109B494AEDDC33B4783C73401
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:Km.[%>.[%>.[%>yD/>.[%>yD.>.[%>.G)>.[%>.y.>.[%>.G+>.[%>.y/>.[%>.y/>.[%>.D6>.[%>.D6>.[%>.[$>![%>.y.>.[%>V]#>.[%>n{!>.[%>Rich.[%>........PE..L.....{:...........!......... .......=.......................................0.......................................x.......m..x.......x........................,..............................................|....................................text...b........................... ..`.rdata...j.......p..................@..@.data....[.......P..................@....rsrc...x...........................@..@.reloc...=.......@..................@..B(.m=8......>E......=O....#.?Z...".m=d...'.m=q...........KERNEL32.dll.NTDLL.DLL.USER32.dll.ole32.dll.OLEAUT32.dll.GDI32.dll......................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):209608
                                                        Entropy (8bit):6.343103011256511
                                                        Encrypted:false
                                                        SSDEEP:3072:kBOrV7gwFcKneF9s2x+eDYIRXDc6VNeFjzBB9g3A/Vt8DbtUfREm/UmL/8zc8N9R:k0rVdCVrsEncIRXDdVNeFBIk2DgR4d
                                                        MD5:908938D3BA2D870EE9FC6238A4C6AF95
                                                        SHA1:E8648D6D69FD5CF900C4BF98B210F6921BED3EF5
                                                        SHA-256:40CADBFB2EB5732F025D687664F34239DB7153A192BCA0287F9208852B201FB6
                                                        SHA-512:F9433F48330F7DDC64EDB8A64229C1490FA31978E9F4FFDC5FA5FF8B18430317A39A07A559D560051BA195B730429ACFB18EDB38BF712507B00AC788FFCA0B74
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......:....f......#..... ..........X........0..../!.........................0.......i...............................................p...............................................................................................................text...f........ .................. ..`.data....7...0...8...&..............@....rsrc.......p.......^..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):796
                                                        Entropy (8bit):2.1709395683364
                                                        Encrypted:false
                                                        SSDEEP:3:2Ao1ihaQDeFS4qs//l8AqjXF1WX0jpuqje2up1Y1p7vuV//14En:251peeFuE8Aqju0jFjenw7WVX1j
                                                        MD5:892C3A800773081A9110542550B11EA4
                                                        SHA1:A9D593E2FA8A59D4F4425DD7679B3D600B47D3F9
                                                        SHA-256:03EEA05D4F15377229E49E38887D2B2BE57E80988FF9741F15F4A6C1EF377562
                                                        SHA-512:68C3021FC86328473A45A56AAE1FF0207956C72392036DB6B4CD67803C701C61B686F925C527DFDAE1A1F98806C10C4A107949113E0306720B699844C97D6999
                                                        Malicious:false
                                                        Preview:........(.....Z`.O.K.$...?..-.{P./.;.T.x............`...................................DataDirect ODBC Driver Pack.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):32768
                                                        Entropy (8bit):2.8457754129966433
                                                        Encrypted:false
                                                        SSDEEP:384:7GiZrKbKxGbk5MOqerr5iKVHHgEKZ2ajjH:tWbKxGbk5MOqirbngbj7
                                                        MD5:2D9A1115B872258CFCD657E32A2955B8
                                                        SHA1:23021F48D1F741BF04F79DB49202A0A3243F3D05
                                                        SHA-256:5D137E1FE18A51D7A7AA6B5F67BA55E00ADB44155F771F81F56A22418FA8EB6F
                                                        SHA-512:F08CEFE2F8D208CBD554B673300536C69C0F08B016B236293CAED0E62C7393CBABC4F8D377EC5BB05D902DAA96B3370648CF188C0B5A0989AFBEFCDFE0B3F205
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L...M.t9...........!.........p...........................................................................................................]...................p.......................................................................................rsrc....].......`..................@..@.reloc.......p.......p..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):57344
                                                        Entropy (8bit):4.985155994169938
                                                        Encrypted:false
                                                        SSDEEP:768:r/LUjp/k9cBvKyKjvyalzmxzaoxz8VeqiX9WHFN1T8Oqm/TKFIJsa:8jp/kWBC0aR8nmLKFIf
                                                        MD5:C57A3BFF1408C33DE5DA5BB1C62ECC5B
                                                        SHA1:1A4DE7F1677689E71C2AC78080AE62687808FAB5
                                                        SHA-256:83EFCAC4F78331E6F8F25ABBEBBC11667E11F46627AB188EC7E00BEB51B9DAC9
                                                        SHA-512:D2E7B4FDF32E45B032823B7A515BB348DB63A1CD63A3EC7D286521FCCDD39870BABD4E82038FE8937CBC8C30F2FF6D2BFBD05F9CE34CFF2A153654B77AFED08E
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........^~..?...?...?...#...?..H#...?..4....?...?...?... ...?..4....?...9...?..4....?..Rich.?..........PE..L....Y.:...........!.........P.....................@.................................5..............................p...........P...............................................................................D....................................text...3........................... ..`.rdata..............................@..@.data...............................@....rsrc............ ..................@..@.reloc..............................@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):3.485382050322971
                                                        Encrypted:false
                                                        SSDEEP:192:i9NOy89Skl9gzr3HUZTNzEOsrt/V8Rhfv67fSryIAuAhqLaPXGOS:i9NOGFH3HYTNzjsrt/V8vOSryShLaP/
                                                        MD5:BB46C0B126E28AED97D3DDFC96BE0902
                                                        SHA1:BAAA2A2CE2BA8563E4F6298A9EE2BF5D38D1AB2F
                                                        SHA-256:BB2469FC8087D0CF223E2344525A8FC536CF2CCEBC213F43F765FFAFEE44729E
                                                        SHA-512:747C578E3D44ACDF079693A8887EB898A6A213DD190AE98FECC348EAA371772F4BC98BE4C195F0C5A68BDB38EEB3D9F57B81189E46E284551B10F7F7664EA643
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k!../@../@../@...\...@..`b...@...f...@...`...@..Rich/@..................PE..L......B...........!.....0...0......l........@...............................p......&h..............................P8.......3..(....P..4....................`..............................................`... ....................................text....(.......0.................. ..`.data...H....@.......@..............@....rsrc...4....P.......P..............@..@.reloc.......`.......`..............@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):49223
                                                        Entropy (8bit):4.109718425650408
                                                        Encrypted:false
                                                        SSDEEP:768:+ccYopyfE7saYHK54TbAG9sAiw6SlglrtA:ZcYop1gaYO4oG9sAu/rA
                                                        MD5:9B7EB9FB8DF4F52965CBC4808EA5062D
                                                        SHA1:5D516D6F766A1911C7F1AFCC9B71A2A90F426B02
                                                        SHA-256:30BA60E53FACB1F6AB703108688CE281DFEBEAE01A203DE0D800EC6DE5089538
                                                        SHA-512:C69D998736D2F6CCF515D35436EE0CCC32403F0A6A0E22F28CCCBAF837D65D027E5470DC5805A02ED599DFDC32B113CB394EACBBDBD4B5879EC2C30805D55304
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......uFq.1'..1'..1'...;..4'..0...3'..g8..9'..1'..)'..S8..4'..n...4'...!..0'......0'..Rich1'..................PE..L..._.{:...........!.....@...p.......1.......P......................................"...............................PV.......S..d....p...3......................0....P..........................................h....P...............................text...E1.......@.................. ..`.rdata.......P.......P..............@..@.data...l....`.......`..............@....rsrc....3...p...@...p..............@..@.reloc..............................@..BN_.P0......N=...V|)LG....sXNQ...z.[J^...........KERNEL32.dll.NTDLL.DLL.ole32.dll.OLEAUT32.dll.ATL.DLL...........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):4.898095142151349
                                                        Encrypted:false
                                                        SSDEEP:384:J+vR8H66UYH0zwqXI7sf1PipgoMpUIp5DVFnJZJbBi2wq2e/8B5DXbON3WyIaW5i:gCa+UzwqXw9GZ9Bi2ldClmJhWc2tIGS
                                                        MD5:3160134FFCEE79CA0F64F305858F468B
                                                        SHA1:ADD3DF032A94EDA0872F06003844480145906B4B
                                                        SHA-256:F7CE6181546DFC6F72B012EB16ADDBFEEF2E1966455F4165E17287D87BCEB415
                                                        SHA-512:DAD017DB58DED87008409094655B0B476FF8F3C639EEFA082D3513687FFA36B9214F46B4AB26B0DB9444A6B785A44786CDFEA4C5D09C86C4CB3BCFAF582D5851
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i~..i~..i~...b..h~..&\..k~..m]..h~...^..h~..Richi~..................PE..L.....aC...........!.........@......................................................9Y..............................P...........(...............................<...........................................`... .......X............................text....|.......................... ..`.data...............................@....rsrc............ ..................@..@.reloc.. ...........................@..B.$.>............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):192512
                                                        Entropy (8bit):5.9642286021294835
                                                        Encrypted:false
                                                        SSDEEP:3072:068MaRFejZOvjqOTN9cWLBuQVNysFsfEz1vUgfK/vsIzx4yEo9:3cpAW9uQVUpMJvKMaxB
                                                        MD5:D24020E137BD588D955ACEF0A8E389CF
                                                        SHA1:7836AAA05532145E85C770EFA6B06398E5DDEF7B
                                                        SHA-256:815F428668D75B9328ACA5199A601F1DADB949D50D29E510E73E260B76323852
                                                        SHA-512:EC91F81F66B365D7C4C291D066F64D74A964D3535AFBC72A29C0B6F0DB1B7B260565F26A3CFFB5D4E48C63342B637A65B127019F58982C43593DC81FFD569852
                                                        Malicious:false
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......'$.cE..cE..cE...Y..dE...Y..aE...Z..gE..=g..`E...Z..gE...Z..gE..Z..aE..e..bE..cE..`E..5Z..pE...Z..nE..cE...E..ef..@E..C..bE..e..bE..RichcE..........................PE..L....A>=...........!.................................................................................................@.......,.......p.. C...........................................................................................................text...%........................... ..`.rdata...J.......P..................@..@.data........P... ...P..............@....rsrc... C...p...P...p..............@..@.reloc...$.......0..................@..B................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):307200
                                                        Entropy (8bit):6.022609410600443
                                                        Encrypted:false
                                                        SSDEEP:6144:FpQDKIhkfJxWbuqzTZSDS03HSWAuV0W+td9x/LJL:FpQDKIhkfJxWiMTZSDS03yWAuV0BrH/R
                                                        MD5:8394AF480C146EC7F7A554EA1FB8E9C4
                                                        SHA1:C44B3BD7D524A0F37D1171F4066C7BD0AA7E3CF9
                                                        SHA-256:73EE0E2B4822A03136B18AB32C951CFC5E7C68A40B046B82E68B1B156582FC18
                                                        SHA-512:7E7BB50BFDDF3B69813F4A87DCBFC76A6A3DCCCD6CC9F459DCD56A222EF82C980B5B5A900293CE8A6DBDB1C68483443726D4834886AFB067A1A009B875D03E1C
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........oa8...k...k...k...k...kP..k...k...k...k...k...k...k...k...k...k...k...k...k...k.-.k...k...k...k,..k...kRich...k........................PE..L....Q.>...........!.......................................................................................................p........ ...S......................4....................................................................................text...;........................... ..`.rdata........... ..................@..@.data....+.......0..................@....rsrc....S... ...`... ..............@..@.reloc..X .......0..................@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):4.713712240941136
                                                        Encrypted:false
                                                        SSDEEP:384:4tkKyqTOaORsY855to5sNS0yGm3WyzKIN19xqgefE5sg+OjWgDpu:8kKkWt2sLyDJ+EnWg1
                                                        MD5:BAF2D0717D304BE1C5A265FC01D92FF6
                                                        SHA1:E02B63B69C92478B03D7F105F4A494F012E4F66A
                                                        SHA-256:7E67EC445AA7B8C2915339514DC025C432C6253FDA8FC5463F5F704F5999E846
                                                        SHA-512:CF51856162C34DCF373FAABDE89168EC63B9DC86F883867EDCDEE8D6BEAB09673BF4995D52E6A6C42EBDA820C6332D962E0ED3540EC747CED7398B2AD2BA3E76
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................N....................2......Rich...................PE..L......C...........!.........@......L.......................................................................................~..(...........................................................................`... ....................................text...Ns.......................... ..`.data...,...........................@....rsrc............ ..................@..@.reloc..............................@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):570128
                                                        Entropy (8bit):6.368068172894281
                                                        Encrypted:false
                                                        SSDEEP:6144:lO4zReIcAtVXrPsS3Syvqe4v2QeD8yCaDSCwBwAlvz6Bm2hf9QdHHtMMeOh4J7Wu:lO4zRe7AvBiyvqe4pe7wHlv1tO7VYFk
                                                        MD5:8888BDBD4E118D915D40A11748282BCA
                                                        SHA1:4E8822D2242D175CC3D708843E2CD71B7EE7033D
                                                        SHA-256:A4B20735BE317A924D2E36707BAAF911FBAE890CA53C5044FB506F15D33BCB6D
                                                        SHA-512:A96F5E72905571DE84F515DD8A19C87D5143EAD532BF01F0132DA8262974BFAF910F24B466D49CD4EE83845FC65F02C273A550786854AEC3E0F4FA713929B562
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....+5...........#.....(..........t.............G.................................Z........}...................... /.......0.......`..T........................P...0...............................................................................text....'.......(.................. ..`.data........@......................@....rsrc...T....`... ...@..............@..@.reloc...P.......R...`..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):942080
                                                        Entropy (8bit):6.65646975675861
                                                        Encrypted:false
                                                        SSDEEP:12288:c30LOWsXFbwAlSc96WPwYW0WxgERNUzD71h1PTMNy:vLOWsXiAlS86WPhOvNUANy
                                                        MD5:4FCCBA7B1CDF3BC6EA31F1B0627AE8EC
                                                        SHA1:770725AF1E58CA070AD3456D8572B3E04A70B7EA
                                                        SHA-256:D97B3B00646FED52DF6855EFBA4269B63F1263EF32B3E477E1E2236A7F126F4E
                                                        SHA-512:0786A923077CC4BA30E79C052590D571F54DF3E3B01BC6F9781B7E0ACF0E3F5D2549641C1CA11ABDCA064D88728F33B7E63C07DFE0D09D19AE339ECB6F86F6E3
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^x4...Z...Z...Z.a.V...Z.G;Q...Z..T...Z.G;P..Z.L.I.c.Z.D;Q...Z...[...Z.x.I...Z...Z...Z..9Q..Z.E;Q.0.Z...\...Z..9^...Z.Rich..Z.........PE..L......:...........!................g................................................................(..............p...>........................................v...................................................................................text............................... ..`.rdata..............................@..@.data....>..........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):180275
                                                        Entropy (8bit):6.1633040175705185
                                                        Encrypted:false
                                                        SSDEEP:3072:nl3w8fl441BooG039ZYWI7ge5JC3t11WX3V0v4zSuoMZmbesm:nlrfZfAQ5efC911y3V0qZ2y
                                                        MD5:A636F5E7FF78759D5F3C677A2875FA2D
                                                        SHA1:DDCE4DC55DF00A4B6B92FBADDA6CF444B4D82F35
                                                        SHA-256:7C33447829876F22FA5D5FD5EF2E67AE06B48BB2BA32840CF44F940F2F547DF7
                                                        SHA-512:8C7A23B9B01075C0355E8889DE007D962E24E84EBA13B896FA8251EF2750D620CDCE74AD423003BFED70C39F7144803089B17C4D949DC9F71714BACC02668E15
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........lx..+..+..+...+...+...+...+p..+..+...+...+...+...+..+...+...+...+4..+..+...+..+Rich..+........................PE..L...M..;...........!.................B....... ...................................................................... ].......Q..x...................................0"............................................... ..0............................text............................... ..`.rdata...?... ...@... ..............@..@.data...08...`...0...`..............@....rsrc...............................@..@.reloc..l........ ..................@..B................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):90112
                                                        Entropy (8bit):4.965285395888949
                                                        Encrypted:false
                                                        SSDEEP:768:52il+An9+x/+RsLeXyQwyUi+75TQjwwMevLC8jRWExNNHRxb4PzI4aaD:52il+OamB5wPQ8ErpNVfOaa
                                                        MD5:5E2CF9895D2D94D593139ADB77F68714
                                                        SHA1:753FCCA7D9E6ABA17DAF198B4F3EFD096509DEA3
                                                        SHA-256:3D80746EB136679B2139AF22A29C4917FEFFE08B986F55C2F224D61001C1F924
                                                        SHA-512:AC2959EBDF0881A724912A77FBEB02D3B61888AAD96814B3B9A1FF4595DC081EBEEAC186A119D46B318D0141461B16F2B60D15E21F3181ED1E5ED242CBA06DEA
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........AN. .. .. ..<... ...).. ...-.. .~.$.. .Rich. .................PE..L...S.:^...........!.........p......0........................................`..................................................(.......`0...................@..............................................`... .......D............................text...@........................... ..`.data...............................@....rsrc...`0.......@..................@..@.reloc..\....@... ...@..............@..Bl.[J............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.673313433135478
                                                        Encrypted:false
                                                        SSDEEP:384:xEXQnim4w2xSKOJtcLFZdMQzf3M7TnSYkN9A/hqycPGSpzuE8d+chaz:xEcim4uUFgQzf4nSH9A/hqycesuac4z
                                                        MD5:1783A2BC9AB938AD923D2040B4ABB243
                                                        SHA1:CA6EABACF16E56723429F65CC5D592699015783A
                                                        SHA-256:0D4B4BAE969E25267C54B367AC9760A718869ACB793CC1380D3A37767BC8E63C
                                                        SHA-512:1A3790C55A7015F4D867C76CB6F4E2D483818A9534E5F4EAD73E44E19B876672EE4A9AEA9A4960E37F729B3C428C40755023FDA7D197064793002B2FFD5AFC20
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K...*...*...*...*...*...5...*..X6...*..$....*...*...*..$....*...,...*..$....*..Rich.*..........................PE..L...].=9...........!.....0...`......j6.......@.......................................................................N...... C..................................@....................................................@...............................text....,.......0.................. ..`.rdata..d....@... ...@..............@..@.data........`... ...`..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):2.452431739694398
                                                        Encrypted:false
                                                        SSDEEP:96:50f6X9EKZaMwah+RtQl9X8N5MMJigpFnUqmspl65z+muijdwMDRaaPp/MQaf:50CaKHwah1wF3TWd/Rama
                                                        MD5:3243A8F5DB572EAE76FE2348B2E106C0
                                                        SHA1:9DCEE517723C6B2206C83C065B4C0B889B69E0DD
                                                        SHA-256:B7714239D578D588B1AECC55E89DC6327716F43A4CB68627ABFE30AB344AF460
                                                        SHA-512:98F5F5BCACB3B86EA05E493883D62744E20351334A71D7E3066D177797BD132A51B647C60A485E05041E3A1F6003E0D093D267AEFD0AA5DD3008C44676426E05
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L...G.=9...........!.........@...............................................P...........................................................+...................@.......................................................................................rsrc....+.......0..................@..@.reloc.......@.......@..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):431600
                                                        Entropy (8bit):6.217541423817009
                                                        Encrypted:false
                                                        SSDEEP:12288:pCPlz9HRXcktcvyk694AVvc8POXqgaLkS8xitZIM5y4w:pCtzao48c8mXqga4SoMkF
                                                        MD5:C7082A0F831F2EE00AB907FC7B9EB040
                                                        SHA1:3A145FDE8D84162E8C86999BCEDA0A2207D80BE4
                                                        SHA-256:C33468445FD4CB01B701AFBC41ACF3422484B734A4490B8CC21E2ACEDAE35DC0
                                                        SHA-512:AFEA29D84C9174539D32FE796F24ABAA134174366FFCB859F3B38BBEBF1780AA0BD0F882C97C8C769D11242E00945DDBFC9613FF1FCEA70D0DBA8B51FA61C6F9
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g...#.}.#.}.#.}...s.".}.l.t.7.}...p.".}...y.".}.Rich#.}.........PE..L...).zF...........!................4............. V................................zR..............................P.......T...(....P..............0........P...F..........................................X... ....................................text............................... ..`.data....5..........................@....rsrc........P....... ..............@..@.reloc...S...P...`... ..............@..B..:@............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):86016
                                                        Entropy (8bit):5.059200142599135
                                                        Encrypted:false
                                                        SSDEEP:1536:9lU/HEzdtrCTdqWlLZAGFrlDMkPXBiwBMeOYey6yJPkk84I8zEP5sM:vU/Hy25XttJlBXh84bwPiM
                                                        MD5:FBB1A200C62241DBA86AA9A9EDB448D8
                                                        SHA1:E6F5B758221D23F608780BF1203D684CB39DB8CA
                                                        SHA-256:D7670874382FF3D458CC7B766127CE497B87D59C420DB5C4FD65D48693F6BB27
                                                        SHA-512:6740B3EEB2D0A4903926F0614BD930DE67DBE3DDE757C17F514EA6C7A1337DB82497035B843FA1AF55C13656B4D88A719FE95FF52D709D5EC4C53E811C0C4553
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i~..i~..i~...b..h~..&\..k~..m]..h~...^..h~..Richi~..................PE..L.... .H...........!.........@......\........................................P......o...............................@...........(.... .......................0..............................................`... .......,............................text............................... ..`.data...............................@....rsrc........ ....... ..............@..@.reloc.......0... ...0..............@..B.$.>............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):209608
                                                        Entropy (8bit):6.343103011256511
                                                        Encrypted:false
                                                        SSDEEP:3072:kBOrV7gwFcKneF9s2x+eDYIRXDc6VNeFjzBB9g3A/Vt8DbtUfREm/UmL/8zc8N9R:k0rVdCVrsEncIRXDdVNeFBIk2DgR4d
                                                        MD5:908938D3BA2D870EE9FC6238A4C6AF95
                                                        SHA1:E8648D6D69FD5CF900C4BF98B210F6921BED3EF5
                                                        SHA-256:40CADBFB2EB5732F025D687664F34239DB7153A192BCA0287F9208852B201FB6
                                                        SHA-512:F9433F48330F7DDC64EDB8A64229C1490FA31978E9F4FFDC5FA5FF8B18430317A39A07A559D560051BA195B730429ACFB18EDB38BF712507B00AC788FFCA0B74
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......:....f......#..... ..........X........0..../!.........................0.......i...............................................p...............................................................................................................text...f........ .................. ..`.data....7...0...8...&..............@....rsrc.......p.......^..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):368640
                                                        Entropy (8bit):5.586081247688742
                                                        Encrypted:false
                                                        SSDEEP:3072:9NZEJpxaZlLOYMAp03rQycjxgM+FcMei/j:9jeraZlFxuK+FX
                                                        MD5:3C1A0BD4BE7917D6AF874FEAE055E28D
                                                        SHA1:EEF06485875C7FE0505FE54EE1346AF610421CF8
                                                        SHA-256:AACF51731D19CCC4B2A01489C0210E5D9BD6EF8886D802BB83FB49DDA5F2C7F5
                                                        SHA-512:6B7131F6223E055F2AA9A3618FC4BC2F4893C5E0C9708CBD0C6E5925D490A921FBC8E7BC48D8E6459738D163771CBB4D140385D590E111A6B97BF99B7DC59B31
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......fa`."..."...".......#...m"..5....&..#.... ..#...Rich"...........PE..L...QE._...........!.................B..............................................................................`...........(....0..$....................0..8d..........................................X... .......t............................text............................... ..`.data...............................@....rsrc...$....0....... ..............@..@.reloc...y...0....... ..............@..Bl.[J............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.318216925570331
                                                        Encrypted:false
                                                        SSDEEP:384:6W2HDi9HjAqwwbEdrakQnfsm4taun3RICVM6Db9S6echEFROQk9D7:6WIDiJwuEN/3auBIKMcIHRED
                                                        MD5:E09FEC233CCD2C6E9D390787D2F87DDA
                                                        SHA1:264F65809115879521DAAD866792C92D9D3C6539
                                                        SHA-256:709EFD24B655E782C423D2A73A7B6DB687ADA69FEDC8DED6A0C6081A416E8742
                                                        SHA-512:E9388F6645A586BCCEE14C5DCABEC47F7B64505C6998C9100A19E32B8ED98BD058458859E2CD6D063CD61E90CD4D812FC47F42BEC54502DEAA31ED13F2F6A4B7
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........a.....................h.......................................,...............Rich....................PE..L...7<.<...........!.....P...@......-S.......`......................................................................Pe......Ha..P...............................(....................................................`...............................text....C.......P.................. ..`.rdata.......`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 62, Total Editing Time: 02:41:01, Last Saved Time/Date: Thu Jul 29 14:33:26 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):2074624
                                                        Entropy (8bit):5.277108105692261
                                                        Encrypted:false
                                                        SSDEEP:3072:tAcGm88F/D6zksqVGpStaTbIfkI15eJWFNHXaPEOrZGERaot3n5fGeZlVE/hP5Zj:t5YksqVyStMwkTsFda/geZ3E/hP5Z
                                                        MD5:3BF8C3B91E578461B194D6620D227F23
                                                        SHA1:254D4D58E68F01DE591E9207898B0774499E98DC
                                                        SHA-256:D38D74FBB7818D5E01251D91E290BDF2B8C0F2835F45E18039A4426FB536F20B
                                                        SHA-512:8FF5177AC387B55FBD39712C3578FEA41F8447479B49C56FE6F66FDB31E12385D328867C3441C9A7DA2D100E38D14EB615D70D439F7DF3E38D5233381E8737C3
                                                        Malicious:false
                                                        Preview:......................>................... ...3.......................................{...L...4...N.......................(...........~...r...t...........Z...............}.......c...b.........../...y.........................................................................................................................................................................................................................................................................................................................O.l.e.............................................................................................................0.............O.l.e.P.r.e.s.0.0.0...................................................................................................d.......S.u.b.d.o.c.u.m.e.n.t. .5.5............................................."........................... ...pu.. ...pu..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 16:11:52 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Wed Sep 29 20:57:07 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):435712
                                                        Entropy (8bit):5.210313030830372
                                                        Encrypted:false
                                                        SSDEEP:1536:DhRq0fBeerIhQVQ+3I+9gc9R6P7KUJSXCMxqAG1V4vS+Zq8veRNXncMEUR21HF:7ser/9WTPTJSXCMxqjevS+ZTveB21
                                                        MD5:9953C4F01E97E2EAF6D408A9637954AA
                                                        SHA1:C0CA83C8458AA1A569586CF343E7AC6ABDA51F32
                                                        SHA-256:D64D4097CC36841AE5E105119E7BD9AF6E099E203C2B6625B5170CCB3AA9EE10
                                                        SHA-512:43A445C46110992A37B40A9B3D73C89443024FEE6374C7B0AB8B3D047CF5888F0DC25C6FC6A11E8139AA5838907D7005BD11D2A58405679F3D14AF8022BFBA1D
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2320.ttx..........cro-2320.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....HC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2340.ttx..........cro-2340.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....HC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2330.ttx..........cro-2330.ttx.......................SQL.....Pdsmon.dll....%Act
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 16 15:54:41 2003, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Wed Sep 29 17:56:45 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):474624
                                                        Entropy (8bit):5.097844904674963
                                                        Encrypted:false
                                                        SSDEEP:3072:mWnYtI5uI5ZzxgLD9yQl2FzHc6AsnkrRcycDCTCQd4iNbN:mG5uaml28/
                                                        MD5:B27917F1EDBCF0193DD90615BEC558A9
                                                        SHA1:6FD7536E2D2EDBA9F19AF0C38CEEEE77FA5FD524
                                                        SHA-256:37162A3D98BBB39027C9E77394BE2928E22E50967213B9FCAA1B371E60B1B298
                                                        SHA-512:293BB3097A5BEC7C6A757811C1B4F76247C93E39E3BEA5285F80EA31EC8267725B1BC811F2DCC5386B6A191D8C32B8303F18D3165418D740D17414272539ED04
                                                        Malicious:false
                                                        Preview:......................>...........................................................<...6.......}.......~......................................................................................................................................................................................................................................................................................................................................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................:...`.......S.u.b.d.o.c.u.m.e.n.t. .4.6.............................................g...0.......................p..,.1.....,.1..............C.o.n.t.e.n.t.s.....................................................................................................?...........D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 53, Total Editing Time: 02:01:06, Last Saved Time/Date: Wed Apr 14 12:43:38 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):200192
                                                        Entropy (8bit):5.169152554231805
                                                        Encrypted:false
                                                        SSDEEP:768:gY1gd28LOecPd/HWE03kAoEl1FVledXN/bYNsnDnNH33wvuatdTuBaBn3Dn5E0fp:n1gd28LOecPVSkAPNyTx3wvuRBaNDVV
                                                        MD5:A64029646B20A91508A70A4BD30D777A
                                                        SHA1:53C5AAE52951DD3E493EF04295B345CD0A4A3828
                                                        SHA-256:39BC863CDECC987002C7BDDBEE15FB0226C4640B795E11B6FDC12EF90F3AB48A
                                                        SHA-512:A5F3EA125987F11157CFC76DA99A5D816C665CCDFE6D9FA141D5AF5D926F85504B8EECCE417570D413DEDDE8EA4CF2C3E4F2FDCC585A0F04FF343E83C1FB4347
                                                        Malicious:false
                                                        Preview:......................>.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...........................................................................................................S.u.b.d.o.c.u.m.e.n.t. .3.0..........................................................................?O.."...?O.."..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Wed Apr 29 22:15:36 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):160256
                                                        Entropy (8bit):5.0388804598932895
                                                        Encrypted:false
                                                        SSDEEP:1536:P1eto9rC6gvneLbeMXHwKY0/Fb57GgYINSfUSfBg:Y6mMXHwKY0/KgSH
                                                        MD5:4695DF6904EADF85F3BB5A039159BB20
                                                        SHA1:BDB639C12D0ED8A8C0393169D51859282D5FA7EC
                                                        SHA-256:0688E65C8A9DAFC70CBACEB99A5B9C97C15E8545149BD907D48F6CB4472EF896
                                                        SHA-512:02C191C002D5D212ED30893EA8E561A1C07FE1E86B49D6A1F40E7960B95B28EA241EB7F953D00681B76AC5798532CDCFD1FAFDC3B46DF416C8D118C5A4D4C6A2
                                                        Malicious:false
                                                        Preview:......................>...................................z.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...............................................................................................A...Fe......S.u.b.d.o.c.u.m.e.n.t. .3.8......................................................................... .F......IH.................C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Mar 5 20:19:07 2004, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Mon Nov 19 15:30:01 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):2127872
                                                        Entropy (8bit):5.298889348940432
                                                        Encrypted:false
                                                        SSDEEP:6144:nEd7toe+rgeeNPGd7crgEpc8mwE/hP5r8:nEdHiA9c2E/hP5
                                                        MD5:74FDFC53C374A476FFDFABA9958F8D42
                                                        SHA1:BFE8448D89E848DD7A14EEB8CC10DB0082B04198
                                                        SHA-256:71D0000B9B8E8DF9F9E34B81F7BBDD0529C0B8D99BAB2DC83170628C34C33DF3
                                                        SHA-512:1DE68F6ED46CF91F47110697F97058B7793794455EFCB73F57501FA683EBD004AA2285326E43D5264E12594973BDC49E8CBEE6A580B170D7E0F34EE312054412
                                                        Malicious:false
                                                        Preview:......................>...................!...................................d...m...o...........%...............L...............s.......D.......C...................W...............z...m...J.......t...u.....................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.1...........................................................................................................S.u.b.d.o.c.u.m.e.n.t. .2.7.6................................... ....................................>........................C.o.n.t.e.n.t.s.........................................................................................................x.......D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: State, Name of Creating Application: Microsoft Excel, Last Printed: Thu Jun 15 19:07:57 2006, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Mon Jun 19 13:10:06 2006, Security: 0
                                                        Category:dropped
                                                        Size (bytes):2065408
                                                        Entropy (8bit):5.312823323440365
                                                        Encrypted:false
                                                        SSDEEP:6144:8Ed1Xb0+PgeDeGGHERLAEgipEXZacZzl9zjBABgppv/5/vR6WOyx:8EdFEwMi9cZzl9z
                                                        MD5:756B7BA54EC030397464A91A2CA8A8F0
                                                        SHA1:46DBA88F3E7B08D7CC26F2A771E4C0D233140153
                                                        SHA-256:6D27506B998E52767972E9BE275509AE1287640C3CABA0D850E21BE9D4E62844
                                                        SHA-512:F35B723ED73D6BE222F402C6839E4E042949AAC33ED959CD82782672FF9AAE4695DC45F7D63317184267A07D085B2FE5001D528B70ADE57DAB68BFDA96BBCD1E
                                                        Malicious:false
                                                        Preview:......................>................... ...f...............................d...m...o...........%...............L...............s.......D.......C...................W...............m...J...h.......~.........................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.1...........................................................................................................S.u.b.d.o.c.u.m.e.n.t. .2.7.6................................... ...................................0".......................C.o.n.t.e.n.t.s.........................................................................................................x.......D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 52, Total Editing Time: 02:10:55, Last Saved Time/Date: Thu Apr 15 16:01:09 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):901120
                                                        Entropy (8bit):5.196993760121088
                                                        Encrypted:false
                                                        SSDEEP:3072:C8q9+TeL0hZGnIillNma52eiBisyZm9aahAN:r6Jc
                                                        MD5:B64E6E0CF32FC4A7CCB5C8D3BB92381D
                                                        SHA1:427DBECB4E18B11CDC6EE54B4FCEA1231535DFDA
                                                        SHA-256:5019F534DC87B51EDFB8DFF231118328587CCD3572C595E452E57AA7B84E74F3
                                                        SHA-512:B87857D15D620FE3AE41B0B8761B67FD85ED48D65EB4D081FBC12A94C6ED2303972341B2B4C076C898FBB4063342E8A49DEA5357F0DE559FA6E59423B83B40A0
                                                        Malicious:false
                                                        Preview:......................>.......................*...............................................................3...........$...,.................................................................................................................................................................................................................................................................................................................................................................................................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................2.......S.u.b.d.o.c.u.m.e.n.t. .4.2............................................................................|.".....|."..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 76, Total Editing Time: 06:03:59, Last Saved Time/Date: Mon Jul 28 15:25:51 2008, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):187399
                                                        Entropy (8bit):4.9388946711249355
                                                        Encrypted:false
                                                        SSDEEP:768:hP25wAQghxgQwBRaKgQwAQBRhxBRRAgwAQCF1lS8Fgwfv/mTnFGZE/hP5Si6N+2/:huOjFuE/hP5Si6x62
                                                        MD5:D09CD0BF633CD0605976F14AE87B35B9
                                                        SHA1:6FDE766F4DB41383C067AB5179CE47D83413F5B2
                                                        SHA-256:D63BEBE3FC83950403F69AFCEFAB59612F44B3D5817C419F3383D95A079BC025
                                                        SHA-512:297F15C9315AB2159C8630C14DA3E9C25B1A0B200B51A64EF3EB2A82FEA4619D61A7024A07C166C17B6DE8440247193247F436CD1C8383C95B8F3C4D4E46583F
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m.......................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 53, Total Editing Time: 04:08:04, Last Saved Time/Date: Fri Dec 17 19:08:06 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):61440
                                                        Entropy (8bit):4.833909151781048
                                                        Encrypted:false
                                                        SSDEEP:384:G9NvsBioHfL2O1hhCncEnYeKnDslIADOrlBHYH3sVIc:JL2+hwnDnYeKn
                                                        MD5:010437FD9249DE33A524028CB861559E
                                                        SHA1:343EEE5E9C4F8CCDD3BA0962BE55238D58F3F448
                                                        SHA-256:07E783E5242BFED746924B7678AADABC12C52E463EC0161778BDA98882073612
                                                        SHA-512:DFD2E2E68ED5C8624EAC69EB559F45FE5F08A902745E400CF7AB1ACF3B8800B919CA74851783DD94CCE313027D5F9BFA69CFD9B88F4773151C24F5F0BB2C40DB
                                                        Malicious:false
                                                        Preview:......................>.......................E...........A...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .9..........................................................................F....`!F.k.....I.k.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................*......E.m.b.e.d.d.i.n.g. .1.1........................................................................F......M.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Mar 5 20:19:07 2004, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Mon Nov 19 15:30:01 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):161356
                                                        Entropy (8bit):5.177382724517874
                                                        Encrypted:false
                                                        SSDEEP:768:ep2c9joPH0MdlojY7vmW1EtujSD9DvcRwS+Ln9:9c9amGmWAujI9DvceS49
                                                        MD5:38AE604FEB6ECCB8EF90ED989E95B55C
                                                        SHA1:1B48DFDB4F3572758EF88460B29D03879620AC5D
                                                        SHA-256:61E0E173791B801B023AF5987484487A59CF5FE19C0642BEC8BFBE49677451F9
                                                        SHA-512:3C41155FDF0A2963C87F1272899C6E3A8C525E2C6982BB080624C8374970B02AD4BD36BFBC570975147BD3E73C3304D71960D48767C7172F45847B9011F28D40
                                                        Malicious:false
                                                        Preview:......................>.......................................................]........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 65, Total Editing Time: 14:30:00, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Wed Dec 22 20:39:36 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):65024
                                                        Entropy (8bit):5.10343096382262
                                                        Encrypted:false
                                                        SSDEEP:384:wIyubiGxnps2q3/FanLN4oCYoBUXmfZn11DP5MN5GY3WqN1xYNifO8fda9C44CVD:wunpTq3/FaZFXmfZnj
                                                        MD5:097E6B26FE7DD4437D8A343EF52EC517
                                                        SHA1:BF9B400E4D56BD9D4D6E58CF07F5647428BDB03D
                                                        SHA-256:79ACD4650E807D66454E0B6B935D3A7E7EFCB728C1DDF33DBA6F65CFA074BA58
                                                        SHA-512:E6D13C7D55F6C803E530F6BC358ECC4282F32C06F5F75F45FFEE7E05CD1A29CA24E4E1799CBEF86A8325DD46FA6FB88451A4C487B6B642DCD80D710C695B4E8A
                                                        Malicious:false
                                                        Preview:......................>.......................;...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.0........................................................................F....@..Yf...@..Yf.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...............................................................................................p...p.......E.m.b.e.d.d.i.n.g. .2.3........................................................................F.......Y
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 125, Total Editing Time: 1d+06:37:40, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Apr 2 15:23:54 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):108725
                                                        Entropy (8bit):5.347342388943793
                                                        Encrypted:false
                                                        SSDEEP:768:Etuya2n71onFjEkEOnUD8hS2ktBmm8F/pm+g:Et5oLC8F/p1g
                                                        MD5:24625381A4A79D98BB9D42D6B7F9A5FE
                                                        SHA1:5D71A3C809D7DBE54A1D7D124C56471B419F1A7F
                                                        SHA-256:391152A4E0F66892A48EF07066A845E346C749ED479501402C907BA3E4639677
                                                        SHA-512:9263939EAB0EBD221D17F45A76AA0CF00F4A38E6204E25990B4C1226D06035D7856F3F6239BBCC86F81B9C4DDA1A46BD741FE9976AE50780B69BF078B38075BF
                                                        Malicious:false
                                                        Preview:......................>.......................E...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.8........................................................................F.....7..2u.. ...2u................O.l.e.............................................................................................................C.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .2.0........................................................................F......!.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 60, Total Editing Time: 1d+02:34:48, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Apr 2 15:44:49 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):89600
                                                        Entropy (8bit):5.324389651089383
                                                        Encrypted:false
                                                        SSDEEP:384:AUfKDNLa1NuYqe26TngjniVd9znZUAQ1FYRzJ8+m63q6dUyAyxjR4avUuVxV79eV:pR2OngjniVd9znfTRDU
                                                        MD5:D4AF83ED906C7B634BB7988F5FC77D9E
                                                        SHA1:2C473D306D0071F75D891A2F108677E4563D8609
                                                        SHA-256:96D3F4B240FCAEEB80222FB2107C4D1274FA3E87E46CBE11F5465657B143C28A
                                                        SHA-512:FA3B57EC70D34C33BAA41891FC2C8B4A34113027C9B1BE743F14E3EA823E6AAA9E296CEE1A3B1FE8E210DFB2A3A02BF2AAA777EE79642729D7E0813268F05074
                                                        Malicious:false
                                                        Preview:......................>.......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.9........................................................................F......)w5u...-.w5u................O.l.e.............................................................................................................=.............O.l.e.P.r.e.s.0.0.0...................................................................................................8.......E.m.b.e.d.d.i.n.g. .2.1........................................................................F......:w
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 56, Total Editing Time: 11:09:29, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Apr 2 15:46:24 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):112773
                                                        Entropy (8bit):5.250973108086118
                                                        Encrypted:false
                                                        SSDEEP:768:EX82dynZ8nzdp1UQhrV6x0KvnPC5F3RnO:T4LLOPQF3RnO
                                                        MD5:C776CCEA447F74098919D2CD84E21F27
                                                        SHA1:39A2C1D292006A4EFF7572393DBF5534D835C95A
                                                        SHA-256:EA699B7EA87FC4A1F48ABEDA29707D3991950ADD632B54E5CD82D6ED6E19E5A4
                                                        SHA-512:E7A0001ABDABD65F597C77688A14291AC67FB993BFFEFAB98B35548832DA0823435D4C694CE26E2DDF8D91AA2A39EAE8A52A938463F70BA7074C6F879A7AD982
                                                        Malicious:false
                                                        Preview:......................>.......................O...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.2........................................................................F.... v}.5u..`...5u................O.l.e.............................................................................................................@.............O.l.e.P.r.e.s.0.0.0...................................................................................................8.......E.m.b.e.d.d.i.n.g. .2.4........................................................................F.....K..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 65, Total Editing Time: 1d+15:03:26, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:13:15 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):108914
                                                        Entropy (8bit):5.248018963968515
                                                        Encrypted:false
                                                        SSDEEP:768:U48gnilnzJ1HdBEXHHXiQtsCnm5KYiuqqmrRQ:UekzJb4sEEziuqVVQ
                                                        MD5:12CB40DE811F5393136639186EFD472E
                                                        SHA1:22AA2F1FFAEEA90D910E93EDA4DC1B042769DFD5
                                                        SHA-256:EBD8E59E2EBBC54B139F101EDFDD4972A7466AE8836D956F78BE53258F960A93
                                                        SHA-512:3DB9E9380DEAECE075B4F82D81E881B385191BC48517600AAB48428669CDF9F13E6D108EC26FF0B1B914E368E0A6B4E8F9D967132556C9A2A781D73844D711F3
                                                        Malicious:false
                                                        Preview:......................>.......................Q...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.5........................................................................F......r..u...<~..u................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...................................................................................................&.......E.m.b.e.d.d.i.n.g. .2.7........................................................................F........
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 69, Total Editing Time: 1d+06:12:29, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:18:06 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):98304
                                                        Entropy (8bit):5.336808297146148
                                                        Encrypted:false
                                                        SSDEEP:384:nZ3AqRFh9vx5LsU1WtnPMn3kB/lH8gUPVncL3heqR3TzGaQnQ1nXLuM3X3s3tkRh:5vx5LsUEtnPMnUB/lRUPVn7MHcM
                                                        MD5:A38D6C5A69B882D02ECF73C0E5AFAAE1
                                                        SHA1:0B8C51858A55123050184ACAA72D031C82B34968
                                                        SHA-256:84EB99CD7F7F121443C559759B9E79DB0095F6001B304E343BEFB14876BE21E2
                                                        SHA-512:2DFF4584EED803BDCF89F8B4764180B354E6A0A56A016303678643D1BBD6FD797006CD05044C03E880FC7B7489029ED3AD7EFF7179B0ED3AF2C07F078F9AE94B
                                                        Malicious:false
                                                        Preview:......................>.......................G...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .2.9........................................................................F........u..p....u................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...................................................................................................b'......E.m.b.e.d.d.i.n.g. .3.1........................................................................F........
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 77, Total Editing Time: 13:19:08, Last Printed: Fri Nov 19 19:45:23 2004, Last Saved Time/Date: Fri Jan 21 14:19:25 2005, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):87552
                                                        Entropy (8bit):5.292860622249849
                                                        Encrypted:false
                                                        SSDEEP:384:0IVAgpIDVV3pdY7J84+ZEHnUzmLmCnFJBPncQ5olvPmKgTQVbDpdTC0xIBpIlxyi:UBHpS64+ZEHn0CnVPncxcA
                                                        MD5:D57ABF650F3A7C4ABAFE3A95464A576E
                                                        SHA1:888CC2AB4F445D3C25F5030ABC91839D7A75F015
                                                        SHA-256:4F11CC3F6D5DBA4EC2B1A05ABF3819BA081F21131B80F092F0E8A4EC0E8109A4
                                                        SHA-512:C46831025A5856D9559A9EE045105931441F2EF813202FCA6DFD7E33D71CF63175103BAB94E4F0F07E98E66E21746B182C9F550942E3CECBCB655437FC48509C
                                                        Malicious:false
                                                        Preview:......................>.......................@...........0...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.2........................................................................F......5....`|.5..................O.l.e.............................................................................................................8.............O.l.e.P.r.e.s.0.0.0....................................................................................................:......E.m.b.e.d.d.i.n.g. .3.4........................................................................F.... ..5
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 81, Total Editing Time: 1d+08:19:54, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:20:08 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):107061
                                                        Entropy (8bit):5.2458729633908385
                                                        Encrypted:false
                                                        SSDEEP:384:pGEVny+Or43UTn0jgysu+snyMQnf07AGfiEgwmrqnqMYF18r6q0fcdcClUvKPLjU:tZW10jgysu+snyMQnCAGfiEgwm+nqqDw
                                                        MD5:0E08FBEEF0207A68F62D4B1D7DEF1C7A
                                                        SHA1:D27D5D35A399A73F82025A1EDCABE1E2071681B8
                                                        SHA-256:40E0F4AC3C8E326230535E4553AEC1B51F941A863417538E5EDF35A86F2B7F6F
                                                        SHA-512:51B6660B2667AB4E6312BBD54765B15150D24C8E93A07F0755DF4733936323A8614F2F15EA6016D1CD1E69D2DDB398A6442B94F4F82C74E7154A86AFCF29E500
                                                        Malicious:false
                                                        Preview:......................>.......................P...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.5........................................................................F........u..@...u................O.l.e.............................................................................................................:.............O.l.e.P.r.e.s.0.0.0...................................................................................................,'......E.m.b.e.d.d.i.n.g. .3.7........................................................................F....Pr..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 84, Total Editing Time: 1d+08:03:53, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:21:39 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):106941
                                                        Entropy (8bit):5.190240409169272
                                                        Encrypted:false
                                                        SSDEEP:384:1/3D+TQ+w2k8nbrnHvqKbV9QhrVRxhBRUQ7ItnF+PQXj01JoRTqQVeOBGws9t8O7:Dh2k8nbrn5QhrVRxhBRUQ7ItnApbRz
                                                        MD5:D5250C1D0DC2D60F86C6F3709FFD814D
                                                        SHA1:2043CE28896350EE6382B3172C5766332B09D890
                                                        SHA-256:36C9C8DDB2D33CABDE074D4D11E53CF22E41C822B0CB6C48FC64CE6036B9494B
                                                        SHA-512:3C6B69E7FA422A1597F3C75F24163F7D75FD0E357F6060C610CB71AE1CE7777E01BFE58B0B4268AA1316F653BBE1DE34A001270C43322D1D4D577D899FC3F6F7
                                                        Malicious:false
                                                        Preview:......................>.......................Q...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.9........................................................................F....p.?.u..P..?.u................O.l.e.............................................................................................................9.............O.l.e.P.r.e.s.0.0.0...................................................................................................$.......E.m.b.e.d.d.i.n.g. .4.1........................................................................F....p#.?
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 96, Total Editing Time: 07:53:47, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:22:29 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):100864
                                                        Entropy (8bit):5.165912085213481
                                                        Encrypted:false
                                                        SSDEEP:384:xMLqp7YPTQPy7qUDcNinkW1dlE31rlsI2nG9XdjnHjjIH2An0zuuNz8wcNAMULKM:q3BDwinkoCD6nG9XdjnHjjIH2AnsBPY
                                                        MD5:41E08E237789E1CD4CA9D79EA0104A51
                                                        SHA1:35822182ADD8504CBAD4F16E2A2709F1B79BB859
                                                        SHA-256:4E5371E38A984141C2F9922C1A1FFAE659F0E33D86ECC0381F2F24595187634B
                                                        SHA-512:EC7386B8FF167AC216B796B7FD684560B2D51E0C9452F94AA01BD6BC4EE9471ED019035744B464973E1E8C3B9B5D3741C15758678DE1D6D1A1E4AEBA79801E0C
                                                        Malicious:false
                                                        Preview:......................>.......................P...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4.2........................................................................F......c.p.....f.p.................O.l.e.............................................................................................................3.............O.l.e.P.r.e.s.0.0.0...................................................................................................4.......E.m.b.e.d.d.i.n.g. .4.4........................................................................F.....Fr.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 100, Total Editing Time: 10:28:55, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:23:03 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):93184
                                                        Entropy (8bit):5.351003521831334
                                                        Encrypted:false
                                                        SSDEEP:384:46cHcDWNkq1ED1vvdmnYGngnmJn6RsLDE/TIYDrUIMNevHA5/AXTeANq+cpAJx2h:cmD1vvdmn7gnmJn645t0
                                                        MD5:820B972D957DB3C16FBDB57EFCBD5FED
                                                        SHA1:7406A6C07D42F7F5B3FD1B6D566A7D301A25E99E
                                                        SHA-256:49DBD73C4739A9BCF13D6D41850413DD22A60E0DF1AF880BAF2598DFEC818A54
                                                        SHA-512:532EDECFDDA49275BAA849A3802B2A49156D4C0AD7E2423D1CADC81CAD132C0661F1FCBFA6173F5CE60D84D59C84C2B4159A525BE0374FBA236371D1A71DCD8F
                                                        Malicious:false
                                                        Preview:......................>.......................D...........2...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4.6........................................................................F........p...p~..p.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................;......E.m.b.e.d.d.i.n.g. .4.8........................................................................F....@...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 95, Total Editing Time: 08:04:47, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:23:32 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):81920
                                                        Entropy (8bit):5.321035397652944
                                                        Encrypted:false
                                                        SSDEEP:384:u/qIV+qqnAtr6napq/7cen2cvUV9XjQscvbWFlgMFWpoNi7abqN3NE50o8KwBv2a:fqqnAtr6nJcen2cv8
                                                        MD5:BE5B1FB3E899FABC3EB7401E12F6DAE5
                                                        SHA1:F1A260B5E17D3FDAF84544CDE55F76F117C0B34A
                                                        SHA-256:19BDDCBD575C3F844BF482ECF3ADA47DA84DFC0CB8F795E56E8657D16546078F
                                                        SHA-512:9F8E821FFD7E88450CC8C0C0B9407B763A0EFD536B6DFABA80E6053E82492E83F2836D360D918427FD0A4716CC395462F5BEB6954A15C2C660A0EE8D3A617962
                                                        Malicious:false
                                                        Preview:......................>.......................<...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4.6........................................................................F.......q.......q.................O.l.e.............................................................................................................7.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .4.8........................................................................F....P...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 98, Total Editing Time: 08:25:46, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:23:51 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):79872
                                                        Entropy (8bit):5.287604768176084
                                                        Encrypted:false
                                                        SSDEEP:384:UULRea+qwnUfPLUnihpE/Hdi17bNnnJGcI7G9R+ysRUlFtBCyAyx1dmLdJ1/UWmJ:OqwnU7UnrVS71nu8RtOO5
                                                        MD5:27085F01DE4D3142E9E4B9BB211557EF
                                                        SHA1:B2B45E3ADCB2E595633992C976C9A261AA6C6D8D
                                                        SHA-256:CA9A355143C4A90E927BEFB8BBB313DACF45E6ABC5FD8C9395AAF2A1518F1254
                                                        SHA-512:399AAB73C33F278E058B0506F9D056E99E2F39D62E73F611AF0C3E2A512647567A238F5B1DC1E2B4F0A7EDFCCE79688B130D1ACFCA154EC0E658E50ABA073AAC
                                                        Malicious:false
                                                        Preview:......................>.......................=...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.0........................................................................F....P.|.q.......q.................O.l.e.............................................................................................................4.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .5.2........................................................................F.....w..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 108, Total Editing Time: 1d+11:09:54, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:26:09 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):111586
                                                        Entropy (8bit):5.367325742316195
                                                        Encrypted:false
                                                        SSDEEP:384:jzJFVv9kfjZNPWGeQY99TnjOaLhnniomsnnnzJX556HPipVqxzeixiIAkzk2tMfH:FvmfL+jQY99Tn/hnnLnzJaN9MT
                                                        MD5:607F6373C804F27F8FDF44A67900FB2F
                                                        SHA1:3B40ECB8AB64990E950052E75D7A1839F7157705
                                                        SHA-256:7839AB6F8668346B93AD1A5FB2F6010E768F746C22746A3698A9F8CEFB2240FA
                                                        SHA-512:B70530BBD70B79E3C2A4DA844CCA9666F79F2A2CE3E07578788A0B8CED4DC65829FF1090B98739E31DA96BAE32B7F94FC982E84C266293046D0F5094ACDF6C34
                                                        Malicious:false
                                                        Preview:......................>.......................W...........S...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.3........................................................................F.........u.......u................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................XO......E.m.b.e.d.d.i.n.g. .5.5........................................................................F....p...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 100, Total Editing Time: 1d+10:02:03, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 3 12:23:06 2007, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):96768
                                                        Entropy (8bit):5.253739160278084
                                                        Encrypted:false
                                                        SSDEEP:384:vKm+fLcKtI4w9+IZnT3vWAlrNcEBa75JL7s8+GtGP37Wufq63f4ZlUWDgnfO9U7E:Iw9+IZniArqka75JL7s8+Yi37
                                                        MD5:DCAB179D3AD3ACFD7A7233C780C4535A
                                                        SHA1:CAE2FA8660F933F310E00CE62EF0BE2EA3870873
                                                        SHA-256:3C96A70007A1F72F740E2145478000E1B5AF48EC302B90B44362316C7F6483FF
                                                        SHA-512:C3848B1E96E8C7AF5F163E0F0D182DCD86259A3DC66E90C872D82603687ED3D8C4904BE4B83D7A75242273629DDD91C7A4C6E9483291D27D7FC7A26ED8EC4D67
                                                        Malicious:false
                                                        Preview:......................>.......................H...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.2........................................................................F.......s.u..P..s.u................O.l.e.............................................................................................................6.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .5.4........................................................................F.......s
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 102, Total Editing Time: 12:46:54, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:25:56 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):97280
                                                        Entropy (8bit):5.433407303868964
                                                        Encrypted:false
                                                        SSDEEP:768:Xv8TdJn1L9e/XR1njdFKaVgSoLUW2nE0QNjNH9//SxR2OfRuBtxVet0eYxeggQYv:Xv+kRRpAooLUWoE0F9
                                                        MD5:172733484051DE3076D0A569F645045D
                                                        SHA1:8BE5BB91E53AAD1EFBACC2C54AEE07FE1C1F164A
                                                        SHA-256:E9BB1BA3289F596D025A5231320B03235BE5B816DC0F488EA01C515E4901E54E
                                                        SHA-512:1252FA1225208BFAAFF9DC65A6825B795EF0909A9998978734615FE782595B3A8A816D08393D36694D02EAA7B292A8328274681CBC4005881F0D071FA08186B8
                                                        Malicious:false
                                                        Preview:......................>.......................I...........E...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.5........................................................................F.....}.]q...@..]q.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................2.......E.m.b.e.d.d.i.n.g. .5.7........................................................................F....`..]
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 101, Total Editing Time: 10:20:22, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Dec 21 15:26:15 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):94720
                                                        Entropy (8bit):5.272781101700666
                                                        Encrypted:false
                                                        SSDEEP:768:gNuIJnEBd9cuF8Un89429gapL8LbniyRbV:g5ETv8aNApL8LrzRbV
                                                        MD5:1B37C2A8DEC9E777B46E116BA50A3563
                                                        SHA1:A8898F875CBC592BC5E20CE53B6EF9F0BB78D7DF
                                                        SHA-256:DF084AB74DF1D8A747C1249B49E6D8D59FBF0502605F32E441B197E8E2A93242
                                                        SHA-512:189D4B233FC19C87796B2CBAA963C482E91DF34BBAB9A07EDAD432383C672FD283CB9A7E4D5A65330767F229357A460E77443E5A05DDD56209B72AD9CB444C0C
                                                        Malicious:false
                                                        Preview:......................>.......................E...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .5.9........................................................................F....P..iq...@A.iq.................O.l.e.............................................................................................................?.............O.l.e.P.r.e.s.0.0.0...................................................................................................T.......E.m.b.e.d.d.i.n.g. .6.1........................................................................F.....N.i
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 102, Total Editing Time: 13:13:55, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Fri Dec 17 19:22:29 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):61952
                                                        Entropy (8bit):5.197538641051164
                                                        Encrypted:false
                                                        SSDEEP:384:Hed98gAdS0dfq8n4hwlnTntEU/19uS6cEa7NyxPRkgmKAKc4IEztItr7XLXjfM:C8gAddRq8n4unTntEU/oV
                                                        MD5:36859ACF22527BC88FBFB9E37440A55F
                                                        SHA1:18AF08920D3346871C714D7BD6FA9CE15EB1ACC5
                                                        SHA-256:75FC4385FB8AD4B3D51363C5698ACB8282103660B6976247C2C2BF503D375A2E
                                                        SHA-512:29FDB57A280EAE39C3F358601885953CB80361AD30390877DD4A1CAACFE1B3921D021FEA3FF9411642FB32BDBCAC486BCA413F834046E793BD304A51449C0F5B
                                                        Malicious:false
                                                        Preview:......................>.......................5...........$...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .6.2........................................................................F....p..m....q.m.................O.l.e.............................................................................................................$.............O.l.e.P.r.e.s.0.0.0....................................................................................................*......E.m.b.e.d.d.i.n.g. .6.4........................................................................F.....,.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 101, Total Editing Time: 10:00:19, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Fri Dec 17 19:22:46 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59392
                                                        Entropy (8bit):5.168408859847519
                                                        Encrypted:false
                                                        SSDEEP:384:+wfUNpSgv0nWjVnVdffnhzK8h4pJQK68JqYVyVSheqCizxT:OpSg8nWjVnVdffnhe
                                                        MD5:97E1308BA3ADF310E6A2DB558CA9D4EE
                                                        SHA1:3FEE31C76C8A7648B9019C07D20A20352906D10E
                                                        SHA-256:4AA41550EC612F8F97BBB2FC015E81FD493DA6C463C4B6A2FE8BA1430BEB5AE9
                                                        SHA-512:2DE6880192BFE2D4B79F6FCCF0E976B573FF3E0E4468BDBDA75C73E07541ECEA6CAA1D5A2345E103DFD40E68D5C1E5F8B91BE40513879AE87AA1384B4E7F2C2C
                                                        Malicious:false
                                                        Preview:......................>.......................1...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .6.5........................................................................F....P...m....,..m.................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .6.7........................................................................F.....9..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 37, Total Editing Time: 03:53:01, Last Saved Time/Date: Tue Apr 13 14:20:34 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):114962
                                                        Entropy (8bit):5.261604527673691
                                                        Encrypted:false
                                                        SSDEEP:768:I2e2hGE0kS1gDYq3nly76JfvRtncMZC03Eew:IjqDJ/cMZC03Eew
                                                        MD5:1FB07367EEE8E3F2FFA696DA778F9018
                                                        SHA1:170EF1512BB373E4EC8FBCA5263B5A08F36B9512
                                                        SHA-256:1D33DC7FF4AD1B4893E9DB4C72C5F6D8D0D86075D397B9186B2854854AB81939
                                                        SHA-512:178EC58D64CD56BC646D86F86E1ACE92425133C10B7761F5049BD2C091464EC32A570B1E2473B5D0FC011119C74266AEF41B48A12E159F2A262A2F0FD9A2ABA3
                                                        Malicious:false
                                                        Preview:......................>.......................X...........T...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 48, Total Editing Time: 05:04:50, Last Saved Time/Date: Tue Apr 13 14:21:45 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):146388
                                                        Entropy (8bit):5.235020092891038
                                                        Encrypted:false
                                                        SSDEEP:768:lHhUlBYVEpjE0l/8ygiedZ/ZXA2GGWOnxviPNisAtk71j3/NhaWVh:cisyzxviJhaWVh
                                                        MD5:47FE2ABB3C4266AA429CAAF719CF71BC
                                                        SHA1:E4C54798A9BCCF3C701159269C45D7E100260917
                                                        SHA-256:18FF6C961A1882DBD1F73D84F8FD8EC5B8C15D93216D070AB4B700D56F7D4DE7
                                                        SHA-512:2C298236AC196DFE6D63D4C39E4E61E33657B6EB532E6C8997238555B8E9D4D0114AA0765B1CD1ED8335595A41BEED6021F80A25ACA9F1CA1F5B830352468DBC
                                                        Malicious:false
                                                        Preview:......................>.......................p...........l...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 43, Total Editing Time: 04:21:42, Last Saved Time/Date: Thu Apr 8 20:48:13 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):107008
                                                        Entropy (8bit):5.203668389142667
                                                        Encrypted:false
                                                        SSDEEP:768:z/e2h2SnE0VWT+1+CiQCQGWPn32nhLn9ltYpM:XlWTQGnhL9ltYpM
                                                        MD5:EC5ED3BE771AF6005AFCAC6A4C51F499
                                                        SHA1:CA5DB43D68B152900E6F53E8E612EC8797F2A3D9
                                                        SHA-256:DF063F6FB7499AD1ED1A1119619EB53522AAE076943B44014F88D29C546256F8
                                                        SHA-512:55AE15036ADE8A92BD83E18F5BC56164E2C591E28C8F27F2DD50EBF0510B2A9F5B593FE58967EBEF7BBD2A49B515E13D66435624A8ACCCB6D4C2ADF924F8B266
                                                        Malicious:false
                                                        Preview:......................>.......................T...........P...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 51, Total Editing Time: 05:01:15, Last Saved Time/Date: Tue Apr 13 14:23:15 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):166675
                                                        Entropy (8bit):5.129449327763986
                                                        Encrypted:false
                                                        SSDEEP:768:GM4hVe2h2WE0VSAcZ7qW5xp7XnWGHP/3HcMJMkcp8sbHVrtHXGnPr9swMnvUgFKG:GjqZGW52uPr9sxDNe6pwO
                                                        MD5:304833086B629BFAF6693DA65E39EE77
                                                        SHA1:F76E35DE8ECC14B02F43CA081BCA9564401A98ED
                                                        SHA-256:7798FE0E09498A983A14564088513DCFF524A92B029E696FA7666E7D2F21CD52
                                                        SHA-512:3B7BC1572975669F1F0C6C47A4DF4F1D790010432CB1B192A878E765135383937188B7A303804C0650AB95BBF3D49CDC86F1926098830880CF1CCBA01244385F
                                                        Malicious:false
                                                        Preview:......................>...................................~....................................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedd........ddddddde.dcddddtdA..dd.gddd.dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffd.ffd.fffgfgfgfffffffffgfffffefffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf..........8....o..... ..hoooo}...;..............oooooo.s.....F..tssssS.p......ppp|9.1........pxprpppqpc{si...^ABCC7,...]:.2........s.s.....@..tssssn.p......pppy94>.....p{pepppqpc{sd...^ABCC7,...]:7=.....s.s.....J..tssssQ.p......ppp~3........>...p{qppppqpc{so...^ABCC7,..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 50, Total Editing Time: 04:33:45, Last Saved Time/Date: Tue Apr 13 14:24:17 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):107008
                                                        Entropy (8bit):5.212905544497119
                                                        Encrypted:false
                                                        SSDEEP:768:Ve2hrxPE0TNYWedi46AMWnX9KtpskNNf:lx7NmX9KtpskNNf
                                                        MD5:0EDE1C44051050AC187DA8AE1A31C2F8
                                                        SHA1:6727E18195931D9FFED15210436147C34CF1CC87
                                                        SHA-256:8D79794DCE8E8102C720728292C6F6EBFA0001110DB7AFB4E02F82F3DC59CAC5
                                                        SHA-512:AD0387D629DD90745A5566F5DBEFD2EC2F7EBAE6428AB89F0169F11D412B917359CE61DFCB47365CD0D0BFEF58DD57CB7991534B97CAED8778321480062F4842
                                                        Malicious:false
                                                        Preview:......................>.......................T...........P...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 49, Total Editing Time: 03:46:39, Last Saved Time/Date: Thu Apr 15 15:57:48 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):76800
                                                        Entropy (8bit):5.009447532664834
                                                        Encrypted:false
                                                        SSDEEP:384:TPJJ7E0hxrneCraahyLQnKwtdKqDnfpACZZkqelRmEChcbSfjSwHbSwT+4suZMs:VZE0hxrneCraah1nKwtdKqDnf6/uaT
                                                        MD5:DFF552E4E496944479F953253BBD7351
                                                        SHA1:C1B05DD86E65721096C510D61D58BD98ED6DF24A
                                                        SHA-256:F694DB14FCF41F4AB49B0E78A5BB6013F5DBB3C98FE2419A8B4F31E9EC6C01E7
                                                        SHA-512:C5C7C86701687A794F69CE62BA2283866641C2BC4DF06E81D2B82B13AFE19EE1F3DB98374CACB0BD10ECCAC55BECA350C074B53132878FF7F167B26104D8ED63
                                                        Malicious:false
                                                        Preview:......................>.......................I...........F...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.2........................................................................F....P(_.."..P(_.."................O.l.e.............................................................................................................(.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .1.4........................................................................F....@M|.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 51, Total Editing Time: 04:10:11, Last Saved Time/Date: Tue Apr 13 14:26:03 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):93184
                                                        Entropy (8bit):4.932281798856309
                                                        Encrypted:false
                                                        SSDEEP:384:my8vFCp9Baa2ei+8dnKS+Mn8ApHNbjjVkyCSiyCizjyfanlIz1c5Ok28Zfcu3HUJ:AFei+8dnXDnjN5ayCSiyCizjyfan
                                                        MD5:CA9D0B00E917E157CC2408DD4DC2EA90
                                                        SHA1:DC8EAF0340917B476C13C22392A923FC9FF2A544
                                                        SHA-256:C08686BA7C85FE2046B9CDDC4A1DD01D46D46C2380097622D01BA26C7FEE2DA0
                                                        SHA-512:17E3A6CD88BA189CB3661E5A297F208B1460B22920B3C49E2388C521694D6A9857AB388530E606F4672671934F7BF29DACD4526881A46427550EE2BCCCD59779
                                                        Malicious:false
                                                        Preview:......................>.......................X...........T...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.7........................................................................F....pn8.Z!..pn8.Z!................O.l.e.............................................................................................................".............O.l.e.P.r.e.s.0.0.0...................................................................................................H.......E.m.b.e.d.d.i.n.g. .1.9........................................................................F....0.U.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 53, Total Editing Time: 04:44:01, Last Saved Time/Date: Thu Apr 15 16:32:30 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):91648
                                                        Entropy (8bit):5.076995311538233
                                                        Encrypted:false
                                                        SSDEEP:384:IjZfGSJA38On49XQTyknFq8OgwWu1w8va5Eqbe8E7wtzwaxJbhA4zCeh5oORTJJA:IsaA38On4UnWgwWu17qbe8E7wtzLxJ
                                                        MD5:5F1D64DB7229FEF2119003A2215D06C4
                                                        SHA1:42A8A4F7B01CC3363741734F4B3191E835B745ED
                                                        SHA-256:6DC59A6992E5543D655C584C7E969C76BE1B5E56A7472A89879FD5D78F94CFD7
                                                        SHA-512:03DEBC9A70F6C3BE45DE952D959B8CD26C30DC1F08C8D1E9383C380592A2158A2209CBB9DB75275838BAB40CA6374609FA472E78EE67216168F322BA357EDBAC
                                                        Malicious:false
                                                        Preview:......................>.......................U...........Q...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.9........................................................................F....P...."..@...."................O.l.e.............................................................................................................4.............O.l.e.P.r.e.s.0.0.0...................................................................................................."......E.m.b.e.d.d.i.n.g. .2.1........................................................................F........
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 68, Total Editing Time: 06:54:28, Last Saved Time/Date: Wed Nov 3 19:31:39 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):175839
                                                        Entropy (8bit):5.344109633971589
                                                        Encrypted:false
                                                        SSDEEP:768:rrFkQq5mlq6EppSEijiV6SArIbn+6UhUHMO5us0LNH:VAvUhUsLxH
                                                        MD5:AA067548970C7B00CBD1AB3D163064DE
                                                        SHA1:E72267289B4399F1F51979382060F3A4015D95EE
                                                        SHA-256:7E38CC0B0BE481B16A64708EAB29064AAA1E7FC9603B479F3A1027C89599C443
                                                        SHA-512:F9FD3F88F52846DD922F17555AF1E390EE1FEBEF38FE4A8633AC34E1E7B60BFBCD14240FBB1A9A006C6F937453961AB5846ACB6169678DE041EEDB811A450615
                                                        Malicious:false
                                                        Preview:......................>...................................~....................................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedd........ddddddde.dcddddtdA.$dd..ddd.dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffd.ffd.fffgfgfgfffffffffgfffffbfffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf..........8....o..... ..hoooo}...\.)............oooooo.s.....?..tssssn.p......pppy3...4...p.pxpppqpc{se...^AABC,...]0...7...s.s.....E..tssssS.p......ppp|9.1........pxprpppqpc{sj...^AABC,...]:.2........s.s.....=..tsssso.p......pppx=.. ...pvpxpppqpc{sf...^AABC,...]>..#...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 64, Total Editing Time: 07:36:52, Last Saved Time/Date: Wed Nov 3 19:32:42 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):183665
                                                        Entropy (8bit):5.227388050044036
                                                        Encrypted:false
                                                        SSDEEP:768:MVSBlBnqKOBlueO+O+u7yuLZJ5p5pZQgBx4Un5pFmWfN1pmSoNZl50Qa+OOKF/RI:M0BISTEWfQSoNZl50Qa+ONdu
                                                        MD5:FBC80A0187F08266BE1BF548458C222B
                                                        SHA1:407678E96CB6077C13DD905E4773B2EF1EC765BF
                                                        SHA-256:5A5FC33AFE7368245E28A7713662C9BDA876F5AC927394A5A8A30836FE725DE5
                                                        SHA-512:11F5E8D401D6FB0172B501776B6DEF21BD11B1081B602F1AC98E8F42D114CDE9EF8EE0728E1F0D509506FCEF5D7D27296290227AF513F4950C40E4F32FCDC8E3
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e.......................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 16:11:52 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Wed Sep 29 20:57:07 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):97792
                                                        Entropy (8bit):5.235321248671491
                                                        Encrypted:false
                                                        SSDEEP:384:h3FE+JrT1W4O7jhcWvL4LRNXncMEUYAkEUANCfn/+ckPJa0ihYpkeQd9H1tiADS5:ijh7vLqRNXncMEUYAs/fn7fOpiq
                                                        MD5:343EF05BA42CEA68AF2C93D6A13D1DDA
                                                        SHA1:48696E1A874EC0D9359750ED88AB9DD120556EE6
                                                        SHA-256:1E7B03D67BDBDA7E22A68F91690B917B454A35B7797A67782DAA970E035E32BC
                                                        SHA-512:7B2135F9A204F2D06C1AF46AA7E0822ADBDD3FA7D7642B759AA46C56966E864DA2D713C36193DE51F5C7148DF0D1961ED98A14D07A798165065F60CF0478B6F0
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f_reports\2003 Forms\cro-2310.ttx..........cro-2310.ttx.............................................................0...................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Wed Sep 1 18:17:24 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Thu Sep 30 13:20:19 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):76800
                                                        Entropy (8bit):4.878667838414998
                                                        Encrypted:false
                                                        SSDEEP:384:jaLie5bHqeAsUpQZE0CoYnSmrWJKQa0CoY2SirQ8Oa0CoPp7ft7wMvWwdmhWwSY/:gx6hQA1vWg1SQ8bepLtH8h
                                                        MD5:5708195C58E3C42049C1B39A69A778CB
                                                        SHA1:A7B8E652A3719B0495FF8BD553E01518F3D3E6C5
                                                        SHA-256:7192672E01BE235F4AEE589F8C89AB98CA3937B0E578E707D2C80104EA658F3D
                                                        SHA-512:9BE7F2BEDB67C1BCB57C713FBE99483F2F59576458FFF2979BD09BB56669AC19A42A5A32B03398163BE93D7011C39C807831901CF90BEEE3A97EF754B32C0F17
                                                        Malicious:false
                                                        Preview:......................>.......................J...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................[...........E.m.b.e.d.d.i.n.g. .2.3............................................."........... ..............F....p...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Wed Sep 1 18:30:22 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Thu Sep 30 14:12:24 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):87040
                                                        Entropy (8bit):5.016829721181625
                                                        Encrypted:false
                                                        SSDEEP:384:Sf1lCrJRyG5G0aAYCMKiOqvsgyLfH0aAYxB3UoggtX20aAYpo0/6wMvWwdmhWwS6:1yGy9ygA9XEogIQ9pxM8hqO
                                                        MD5:F5CDAB6A4DF5F715194C5DB56D5BC3D7
                                                        SHA1:6C4A37A491B552AA28294D9B739CACD9738B0C0F
                                                        SHA-256:702F5AB1C9D04BE301A38CAA092D2D77E3A572DF40D08FFC11F4CF875D2E0C9B
                                                        SHA-512:E35E47012B974896F0904C276EB9BDB9587ABDD8A6891B06BDE60CC14E6D73448FBA3C6E3B536B30BDBE279D6729B2C227D626D7F058BD38C16342405B52E8E0
                                                        Malicious:false
                                                        Preview:......................>.......................V...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................t...........E.m.b.e.d.d.i.n.g. .2.3............................................."........... ..............F........
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 15:18:00 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Tue Nov 2 15:55:18 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):172330
                                                        Entropy (8bit):5.203209297538331
                                                        Encrypted:false
                                                        SSDEEP:768:ZMvUSXCbLRXY+OXLTgcbRRdUKuPkBLpYf78hhxhDhmVhShQhdh5vOG+6z:3SXCbg/gc9R6Pot9hQVQ+3h+G
                                                        MD5:63F5FF7C2D7205CB2E4D97A709C8BC33
                                                        SHA1:4E24825E5143987872329001C92F111290F14E84
                                                        SHA-256:BCD7C0FCE94BA92252B53248F5A7720E9D05EDC5B509B6F5D05640F27C07513B
                                                        SHA-512:C501643907DE3CB3F96C0B9EA6F8871DAA01DF15D6BE2951DD16E97CB346E19A55E12D58D9D2F71F703D42FEE5C8EA830D1657DFD77AF1C00907F73621ADBD84
                                                        Malicious:false
                                                        Preview:......................>.......................m...............................p...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................z...........E.m.b.e.d.d.i.n.g. .2.6............................................."........... ..............F....@o..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 43, Total Editing Time: 05:27:46, Last Saved Time/Date: Wed Nov 3 19:33:51 2004, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):57856
                                                        Entropy (8bit):4.912226439854232
                                                        Encrypted:false
                                                        SSDEEP:384:PWFml8E2XE848Qu9rC6gpbtne38GvfPVmPZn8IYpT0QCp3MaQRbx3eCWQ:1l8E2XEwQu9rC6gvnezvfPVmPZn43
                                                        MD5:3CA49EB0F57DA94C615276F113798BBC
                                                        SHA1:BF7BC7157F202F78272F8E523A3A79064BE0F9AF
                                                        SHA-256:8D5E5F0BDA98BDD948625BD559E1E75E8D6409809A0527678156F602D7CCF44D
                                                        SHA-512:E59A06824B6B995BE87054A7A43A09CDFE033177EEB2E1C2C21465F97C2C2D96CD919202836D23FBC21AF3DCFCCD22507E725E8BD8B9843B4FE08F6B0ADBDEC3
                                                        Malicious:false
                                                        Preview:......................>.......................B...........?...................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only)....HC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\2003 Forms\cro-2500.ttx..........cro-2500.ttx.............................................................0...................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Mon Oct 22 19:25:35 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):97280
                                                        Entropy (8bit):4.976430970520775
                                                        Encrypted:false
                                                        SSDEEP:768:B0jbfG0HYJffpgAnVY7PfsUMXHwKY0/Oxlu7cimw:0btHofHVCf/MXHwKY0/AuIi7
                                                        MD5:8EAC4565C5C68E1989A9FF7987815CB2
                                                        SHA1:0EB3FB50AEF02C35F85F65F5857A716C8AEFA682
                                                        SHA-256:9EC7029D0766167D10E4D46F032B5B108B3B31B3A3237DE100D87E77D2B51386
                                                        SHA-512:C70D33774D966A4E48970C1C3CECDF47F688603A7D50B707A61C4D8EF045C40997ED14CCE9784C08D05A2503BAAC36394E8E2BF1F137BB9CA21D646C73A27874
                                                        Malicious:false
                                                        Preview:......................>.......................b...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.............................................................!.......................................................T.h.i.s.W.o.r.k.b.o.o.k................................................."......................................................._.V.B.A._.P.R.O.J.E.C.T.................................................................................................).......E.m.b.e.d.d.i.n.g. .2.2.....................................................%... ..............F.......w
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Sep 2 15:25:10 2004, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Thu Sep 30 16:30:55 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):135680
                                                        Entropy (8bit):5.128156286632356
                                                        Encrypted:false
                                                        SSDEEP:1536:mV49P3yLKq8o4zLcb2UlUc4K+xTPNRPzUsdiallTonTIn2:1PQyN
                                                        MD5:DA29DAC0A434ABC27100A3A4A367E110
                                                        SHA1:C221D94A7BE299E5E14EBEC92A6DE9BF94480A15
                                                        SHA-256:20D3D0DD26709E180F54668AB6C3699C1868925626FC6B1423D497605E7AD68E
                                                        SHA-512:1472086D61EB119431EEFA82F285077CADAE6E242F704EE586A792E1D47FC241DDA2EE294FAF059CB172093929EBCAB6FFDFF067D1565F99DEF8C99FCB3E6C6D
                                                        Malicious:false
                                                        Preview:......................>...........................................................N...........................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................V...........E.m.b.e.d.d.i.n.g. .2.8............................................."........... ..............F.......
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: State, Name of Creating Application: Microsoft Excel, Last Printed: Thu Jun 15 19:07:57 2006, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Mon Jun 19 13:10:06 2006, Security: 0
                                                        Category:dropped
                                                        Size (bytes):163871
                                                        Entropy (8bit):5.0807907373790036
                                                        Encrypted:false
                                                        SSDEEP:3072:BaoO2BABgppv/5/vR6WOyALYaHueLJJz9nZMEaGzI096cZzl9Q:BaqBABgppv/5/vR6WOyxcZzl9Q
                                                        MD5:1305898D36FFA9B7F2588B4A1500E83A
                                                        SHA1:401DFD86A8927D1CB5E22A6AC704398721C28943
                                                        SHA-256:B1A4B2167F40F9CB5FF128CD49F194334D730ADC6C0B5C71DA91F0AEC41FB573
                                                        SHA-512:E27CE2D9EB5A541E24F690D6951AB133DB81D9BEE17AEAD2A9FE0A562007F24D522FC9A920F0687BE12BCC3CA357760319D70C077992B2885FD8DED3FE36F5A4
                                                        Malicious:false
                                                        Preview:......................>.......................................................z........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...>.......?...............................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: State, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 16 19:02:54 2006, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Fri Jun 16 19:04:24 2006, Security: 0
                                                        Category:dropped
                                                        Size (bytes):122880
                                                        Entropy (8bit):5.031239289107367
                                                        Encrypted:false
                                                        SSDEEP:768:FB9CHpBpB5GOLJTJBEb/1EMAsxv5JQUM0FKmoDd:ZApt1LdEb/nAEv5JQX0Fw5
                                                        MD5:47FFCCC46A2FC77F5FE6538F2BBDAA65
                                                        SHA1:B99466E07ACEBAECC9444EDE30769BE9DF08F5B9
                                                        SHA-256:967BEAFE2035D7AD942A8DEF6BA82D5BD8ABE196A2DF615C7C39F9E6CC27B796
                                                        SHA-512:3829104E23319091FF92652912E9AC6F7AD2812EDDC625599A8B41D4D855F619A46F61FFE797D0243FB3774F49B34C47E42D79B55AB9A53A0D650E4858766D75
                                                        Malicious:false
                                                        Preview:......................>.......................................................~...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 11, Total Editing Time: 01:13:31, Last Saved Time/Date: Thu Apr 15 16:10:09 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59392
                                                        Entropy (8bit):5.20548689364493
                                                        Encrypted:false
                                                        SSDEEP:768:Xu/JhxbQkQmhQ5NM9maf1iZxIHbWCAnBHszjGBAX1mrx7SympaenjKC:eR0kQmsMRTu9sPCQ1
                                                        MD5:F06A082EE26DC7A9FC9AF75EA78CF04B
                                                        SHA1:6FA744D6397EE27FAD957FD2E835003CE0928D2A
                                                        SHA-256:E0B846D5CA7F4D42E7801DA32552585399C441E3D3E3B7C209A1EE94603CBF2A
                                                        SHA-512:0FB7785CE7713382D67CC5FA8E41D0C7371DF9536A0E23A2FCE3A1E9DEDD6A0AEE155B2A0ED95366966CF7A71545B4476A323DCC438615C51A7E70E75DDF4AA9
                                                        Malicious:false
                                                        Preview:......................>.......................O...........L...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .4..........................................................................F....0.H.."..0.H.."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .6..........................................................................F.....Mj.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 11, Total Editing Time: 59:12, Last Saved Time/Date: Thu Apr 15 16:10:40 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):58880
                                                        Entropy (8bit):5.202598797564419
                                                        Encrypted:false
                                                        SSDEEP:768:9x/p8JhxbQkQmhQ5NM9maf1iZxIHbWC8nJfBna/KEn2:9Jpe0kQmsMRTabu
                                                        MD5:F0C67D5BE0C6C23069A98FC9C42B21F0
                                                        SHA1:3664DAC584F65485BDFDD03FC215D817B9DFC30B
                                                        SHA-256:EF0E4EA896076843CCAAD02933AEDBE79482D8AA94CC7E42102E4138D665F274
                                                        SHA-512:3EE740535B59E33A29D9B8B323DEC0B96E6C8552BC38D9C9FD344D91B85AB7284052F6D5968FB2094FC262EFB2F5D80842D9C42392FF1D51BD7169A8F441F0BD
                                                        Malicious:false
                                                        Preview:......................>.......................N...........K...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .6..........................................................................F....pP..."..pP..."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .7..........................................................................F....@..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 11, Total Editing Time: 53:27, Last Saved Time/Date: Thu Apr 15 16:11:02 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59904
                                                        Entropy (8bit):5.210459280768143
                                                        Encrypted:false
                                                        SSDEEP:768:LCRojJhxbQkQmhQ5NM9maf1iZxIHbWCnnkrnCIHWnJE:LEoF0kQmsMRTP62
                                                        MD5:B511926EF1002CB1F4AAA6E2071672E3
                                                        SHA1:3C1D20F9223C2CE424D6B906D9789C493576EC55
                                                        SHA-256:4F495EC0387E14EE0F211F0A53C133D0362A75DFAD14315A9DAB42A7E6D7F6A0
                                                        SHA-512:1958C9CFE296090A6407AB032CC2E160982942AAB6A5B1CDB466547E6503A612632764471AB7EC80546F960C7CB2E69C115CD7B82FEA90ED0D58BEB818BBD8E3
                                                        Malicious:false
                                                        Preview:......................>.......................P...........M...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .8..........................................................................F....pO..."..pO..."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.0........................................................................F.... ...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 14, Total Editing Time: 47:00, Last Saved Time/Date: Thu Apr 15 16:11:40 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):60928
                                                        Entropy (8bit):5.198727350702287
                                                        Encrypted:false
                                                        SSDEEP:768:DQ+bXJhxbQkQmhQ5NM9maf1iZxIHbWCsnThHnRKqn8:DZb50kQmsMRTa9P
                                                        MD5:F3E96121EF1FE4575C5112E52619A9DA
                                                        SHA1:A308DD12F2DB9F5863631ABFBE97554C76E32C9C
                                                        SHA-256:742D520C233C61433A794AB11DB5FBCD236565CFC63A82D2715241BABDEF4041
                                                        SHA-512:94935A8F87744BBA7FEBCC8A5FEA0F3273CB558D7A385ABBB9CEA94DECD2BC247BB934D472D4136FB431C58956355D7DF9252A849D9731F0C546345C056EB6B2
                                                        Malicious:false
                                                        Preview:......................>.......................R...........O...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .9..........................................................................F......+.."....+.."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.1........................................................................F....@tO.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 15, Total Editing Time: 01:14:19, Last Saved Time/Date: Thu Apr 15 16:46:43 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):64512
                                                        Entropy (8bit):5.0872204368180025
                                                        Encrypted:false
                                                        SSDEEP:1536:KCrycGESg0kQmsMRTiGlrfSBaEEP4VpAH9fxFS:d0kQm9RT
                                                        MD5:E6DBE6558E05030B529A9F71B1944DE0
                                                        SHA1:EBB835D973C152D757845AD9E4EDE7A2DE5D4CB1
                                                        SHA-256:C52F450DFAD410C2C177A91DB8C070BF63D3068A52C81092AE60D66AFE88F0A3
                                                        SHA-512:49D6612314178EE866503856AE3E3079C858CA4375F827505BD40423429C120AA388C0CAFA63C4FFE7B36A81BF804AFEB87CDD8739E8F3BAF1E5FDDB533D29D2
                                                        Malicious:false
                                                        Preview:......................>.......................]...........;...............:...................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.2........................................................................F....._#..#..._#..#................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.4........................................................................F....@gN.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 17, Total Editing Time: 01:43:07, Last Saved Time/Date: Thu Apr 15 16:13:09 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):88064
                                                        Entropy (8bit):5.388710930708643
                                                        Encrypted:false
                                                        SSDEEP:768:+nVHYhxbQkQmhQ5NM9maf1iZxIHbWCFnjDnaUoqrnc94RHexedO:+i0kQmsMRTJPjpHA
                                                        MD5:5A6E41E293A03AEBC93266499DA11B7C
                                                        SHA1:6400957B493FED5E571912DB972EBABA94636FF5
                                                        SHA-256:646174976696BE16DE2AE3D451EF356F83D4DE085329301AC5295F7C61342A4F
                                                        SHA-512:1E0159E6EBAAFA8AD8BFC8FA7F000B813DC836A344B6112BCA751D0246196F5D9A0FC094842BFB53FD836CC9B7543FFC23656585E1F00BD09A79CAF4B0A6B84B
                                                        Malicious:false
                                                        Preview:......................>.......................c...........=...................]...............................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.3........................................................................F.....S>)."...S>)."................O.l.e.............................................................................................................7.............O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.4........................................................................F....P.b)
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 55, Total Editing Time: 02:10:00, Last Saved Time/Date: Thu Apr 15 16:46:51 2004, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):158208
                                                        Entropy (8bit):5.340858554251574
                                                        Encrypted:false
                                                        SSDEEP:1536:oNe2HASmU0kQmsMRTXTcDCrycGES5orfSBaEE2pAH9fxWK0mU0kQmsMRTg:F+0kQm9RTY0kQm9RT
                                                        MD5:0393A9F38F3AD7C4A34189358C9754F8
                                                        SHA1:8622DE3DB6B32284333F4A63BD90B3F8F962CD31
                                                        SHA-256:93B0F789471FEF00B74DD158933D1E8F9C5AE045183F89910C9472E91E66DA50
                                                        SHA-512:9322F7A00928E023CE9C9EEC6CD94F338F7661AC2AB2A59BC71DC5B329A873817ABE91CA5788C2B1A6D2966B75DE76588FD57B3EFFC1C5378377DCDE6CD92C56
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only)....MC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\crystal version\cro-3500.ttx..........cro-3500.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....RC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\crystal version\cro-3500-main.ttx..........cro-3500-main.ttx.......................SQL.....Pdsmon.dll....%Active Data (Field Definitions Only)....QC:\DEV\CR Code\CFRS Common\CF_Common\cf_reports\crystal version\cro-3500-add.ttx..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 13, Total Editing Time: 41:36, Last Saved Time/Date: Thu Apr 15 16:13:59 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):60416
                                                        Entropy (8bit):5.20599462556192
                                                        Encrypted:false
                                                        SSDEEP:768:wTlmibYhxbQkQmhQ5NM9maf1iZxIHbWCjnH1I6nd6NbqnQF:glmiU0kQmsMRTLVSM
                                                        MD5:9E7D6F992148FC5550D5DEA0932E7F24
                                                        SHA1:EBA62B123B5CA75C49DC41FE142BF5589E88C2A8
                                                        SHA-256:C09556C17C14E2286977FFB12BE987425EEE0803D607D7446057B55620A2F9D3
                                                        SHA-512:F8B0EA0B0AFE0125E3662C5FF2145F0A25348FD0F8051E010ED7527AB3BA6AC47FF3207281340E73B47644DE3725C040BF2DADCC506C61DBD32AB1FF31F0E66D
                                                        Malicious:false
                                                        Preview:......................>.......................Q...........N...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .8..........................................................................F.......G.".....G."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.0........................................................................F.......G
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 16, Total Editing Time: 01:16:19, Last Saved Time/Date: Thu Apr 15 16:14:26 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):59904
                                                        Entropy (8bit):5.201214682908714
                                                        Encrypted:false
                                                        SSDEEP:768:Mm80tYhxbQkQmhQ5NM9maf1iZxIHbWCInu+lnxhvnK:M5020kQmsMRT2hj
                                                        MD5:AA8902D4CD33C667E28AE4BB9A6CADE1
                                                        SHA1:334D99391F65F36D54A444DAFC31572766E66039
                                                        SHA-256:ED8FDE84B287084F0C961C7198ADAEEA4024DDB69A6613B893E0A3AF160A10EA
                                                        SHA-512:1503E493ED48ED1132A7B3001CC7CB15AEB1F553C14163355A7529285393495C464325EC0EB9EE0D1E313C1B8B7573D7022838B301BD3865B443764EC6C241BB
                                                        Malicious:false
                                                        Preview:......................>.......................P...........M...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.0........................................................................F......\W."....\W."................O.l.e...........................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.2........................................................................F......W
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 16, Total Editing Time: 55:25, Last Saved Time/Date: Thu Apr 15 16:08:54 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):64512
                                                        Entropy (8bit):5.222279462324983
                                                        Encrypted:false
                                                        SSDEEP:768:3QvYhxbQkQmhQ5NM9maf1iZxIHbWCLnWnJ8nOvuquin:3r0kQmsMRTDWn8sak
                                                        MD5:881CE3142335B809B9C88D3BAF0F1AC5
                                                        SHA1:54316525510D401A686BA152A69E658C74F73481
                                                        SHA-256:373BA0BB70D83F47E9F15967318379C42FC4FCDA8C1FF8CD3F7EE4AF47DBF6B7
                                                        SHA-512:6F3C6088109D4FE2331A0DDC5A23B4894D0A9709209B042934794CAF72C05FC79187407D199476D7DD5BBABC2D95834097F194BAD3FCC8A211EF9F1B76C8AB14
                                                        Malicious:false
                                                        Preview:......................>.......................Y...........V...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.1........................................................................F........."......."................O.l.e............................................................................................................. .............O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.3........................................................................F........
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Wed Jul 23 21:08:46 2003, Create Time/Date: Tue Mar 18 18:48:23 2003, Last Saved Time/Date: Wed Sep 29 16:09:05 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):160055
                                                        Entropy (8bit):5.274194490059007
                                                        Encrypted:false
                                                        SSDEEP:1536:LXM5UzLaFCbFD8UlI7wLS4s63a2EPo5FGyy:LXMiLaEbFD8UlI7wLS4s62
                                                        MD5:37EB610A634C1DDFC81FFB4990591935
                                                        SHA1:84E81DAED249A25AA2AEB41F15B57DE8867CC93C
                                                        SHA-256:5D15551981C1099F202823541E981A577372E458BA345752B9B3B0E0E0E2D059
                                                        SHA-512:72DCAA38E5BA795C56F2E5076064BCD683570FBC8ED4DBA83E88CFEC04AD7B30DBA6A78D7D92F8B8AC16BC5671E0D4359D1AEC1500CEC29D99EF68EAD158C17D
                                                        Malicious:false
                                                        Preview:......................>.......................................................g........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...............................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: programmer, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Mon Mar 8 13:36:18 2004, Create Time/Date: Tue Mar 25 14:52:47 2003, Last Saved Time/Date: Wed Sep 29 17:55:29 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):143872
                                                        Entropy (8bit):4.929485413721053
                                                        Encrypted:false
                                                        SSDEEP:3072:/im9jlbEsrtvnwTDCI/dIj8yI5Fik6ulE69OsccKy5:
                                                        MD5:4B55DAB27519155A12B873F1D7D44498
                                                        SHA1:8B9BE194A8DAAECAD472660DB008326326A1C63B
                                                        SHA-256:87BC25D6D57B23CE6CA2E6DB3E7FAB777FA5DE415B7347723EDBA7BF7FA43ED6
                                                        SHA-512:F66495BD44022833DE875DC3788E45CED74D595A8099EB2938B6D2BD2B15DE156FD20557991E946D0CC17D14050A583E7AA3AEF823469C4BAFB805386069431B
                                                        Malicious:false
                                                        Preview:......................>.......................................................Q.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 16 15:54:41 2003, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Wed Sep 29 17:56:45 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):145920
                                                        Entropy (8bit):4.9925301432159035
                                                        Encrypted:false
                                                        SSDEEP:1536:wHgr56AinkrRcycDCTCQd4iNbBm5+q+zG2F:wHc6AinkrRcycDCTCQd4iNbEN2F
                                                        MD5:FC038A5D0FD1B115F67ABE16A2B997EE
                                                        SHA1:F385AC3E5FBD3C5C7E463EA55714797FBA3D3FC1
                                                        SHA-256:B4E8D00C75260301D54369D88E0EEEEF0D83FD4FB7D8D845D927738453497CD6
                                                        SHA-512:85F600ABC3EFB7D782396F347F3CB8F723FCE58671002D75E769714387C7D0E35F456DE32FE5F1DCBA271F4E6780A6E8C64F922EAA884D0D5DE77965FA638DE4
                                                        Malicious:false
                                                        Preview:......................>.......................................................m...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: programmer, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 3 14:49:58 2003, Create Time/Date: Tue Mar 25 14:35:37 2003, Last Saved Time/Date: Wed Sep 29 18:00:44 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):109056
                                                        Entropy (8bit):4.763335759409982
                                                        Encrypted:false
                                                        SSDEEP:768:xnbQqAqLbqr/Su9ySWOQLISXQv+ZN5Zxftt/LIEKjGn:txgLD9yNqSf5ZxV6EKj4
                                                        MD5:65F9BEB9749339F9E44355A5C809AD4B
                                                        SHA1:C9F242F2C6E3361F1ECB802984059CD7C911992C
                                                        SHA-256:B4D9FCAE9C80A489BB0070B090F924B7B21DFAB7ECF45D06C8998287CB1082E3
                                                        SHA-512:9CF7CEB35B63CBA41C3F3EB0C9104D82729531D9426BB8A27536F594CD96A690D4B05C3029A1A7021D417591475E7A8DA5BFA713E53438122A3738D0858CF39D
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only)....RD:\DEV\CR Code\Remote Filing App\Version 2004\CF_Remote\reports\2002\cro-4110.ttx..........cro-4110.ttx.............................................................0.........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Author: State Board of Elections, Last Saved By: N.C. State Board of Elections, Name of Creating Application: Microsoft Excel, Last Printed: Mon Mar 8 13:38:49 2004, Create Time/Date: Tue Mar 18 18:49:06 2003, Last Saved Time/Date: Wed Sep 29 18:02:28 2004, Security: 0
                                                        Category:dropped
                                                        Size (bytes):156017
                                                        Entropy (8bit):5.153834479799729
                                                        Encrypted:false
                                                        SSDEEP:768:R997ilTTQnZqWBCtvOL1HuQL3psNw8I7e+8xiZJSSZJTLenAjM:1fnUd8H0wt7pvLQqM
                                                        MD5:85D19DDF6412ADC30E4582B09B12C81D
                                                        SHA1:2A9E3E70365EDD7E63AF98CC928B1861AF149334
                                                        SHA-256:0D4EA12E2607E86CC5C7F1052832331678005D9E8A64C818BF4D9BF2E131A71B
                                                        SHA-512:2A8A070AD593871890BCF825836AF861F5CD6371C832B406E456F5B35D524E85D27DF5E7B4DA90998BFC890068D79252A353CE98AA3660E8E35FA405227250AA
                                                        Malicious:false
                                                        Preview:......................>.......................................................A...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.........................................................#...%...........................................B...........T.h.i.s.W.o.r.k.b.o.o.k.................................................&...........................................2..........._.V.B.A._.P.R.O.J.E.C.T.................................................................................................`.......E.m.b.e.d.d.i.n.g. .2.1.....................................................(..................F.....(
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 4.10, Code page: 1252, Title: Media Complaint, Author: CRO, Template: Normal.dot, Last Saved By: programmer, Revision Number: 4, Name of Creating Application: Microsoft Word 9.0, Total Editing Time: 39:00, Last Printed: Mon Feb 11 16:23:00 2002, Create Time/Date: Mon Feb 11 14:32:00 2002, Last Saved Time/Date: Mon Feb 11 16:23:00 2002, Number of Pages: 1, Number of Words: 121, Number of Characters: 694, Security: 0
                                                        Category:dropped
                                                        Size (bytes):77312
                                                        Entropy (8bit):5.1864279109289395
                                                        Encrypted:false
                                                        SSDEEP:768:WvRwuJIBchkLEFbzOew7A6irPH9Y2ZVwCFgDv6FoYsHSb:W4BA2SLpzj
                                                        MD5:46278C5B8F40632A170C005DA9D59E16
                                                        SHA1:3FF09C3EA468C6DDEAA8B70E780C1C23987A4B9C
                                                        SHA-256:50D66013ADAEEC5730A46ADB656C69CE53CBA22AC905D6939198ABCD56E6190D
                                                        SHA-512:12E5C6A70A0001AF370D1A82F8931E9F4F1CCD8728C3A7BB67F6D80E8247BCB5272D2C2C2A316D9C7A2C11125A3D747C2B2C0BC2B9895E58B772820A1C0D8B7B
                                                        Malicious:false
                                                        Preview:......................>.......................................................c...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.a.v.e.d.R.e.c.o.r.d.s.S.t.r.e.a.m. .3.4.l.........................................................................>...........R.e.p.o.r.t.P.a.r.a.m.e.t.e.r.s.S.t.r.e.a.m. .0.l...............4...................................................l...H.......A.n.a.l.y.s.i.s.G.r.i.d.s.S.t.r.e.a.m. .3.5.l...................0...................................................n...........V.i.e.w.I.n.f.o.r.m.a.t.i.o.n.S.t.r.e.a.m. .0.l.................2.......................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 16, Total Editing Time: 01:19:16, Last Saved Time/Date: Thu Apr 15 16:15:03 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):90112
                                                        Entropy (8bit):5.462546839098408
                                                        Encrypted:false
                                                        SSDEEP:768:+nYhxbQkQmhQ5NM9maf1iZxIHbWCc+nBn3IP3r8anGFfti:J0kQmsMRTNNMek
                                                        MD5:3250FC4FD11C15C54822054C28780B01
                                                        SHA1:215184E6327FE1AC1D273BADCCED85E782923AD9
                                                        SHA-256:1E7672885014E6B7C146889E2220D70D08901E7C49208B651DD234936AB2A544
                                                        SHA-512:4F73F3CF649EFCA18472C01B431646327F69DE1F5048427471344041BE5A721AE505A9B544BCA1DD1D9616EB098FA0DC1299C1652691AE217F5FFE9FA6CE69A7
                                                        Malicious:false
                                                        Preview:......................>.......................R...........N...................Z...............................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.2........................................................................F.....>lm."...>lm."................O.l.e.............................................................................................................2.............O.l.e.P.r.e.s.0.0.0....................................................................................................X......E.m.b.e.d.d.i.n.g. .1.4........................................................................F....`=.m
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 19, Total Editing Time: 01:29:13, Last Saved Time/Date: Thu Apr 15 16:35:31 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):46080
                                                        Entropy (8bit):5.043756431144704
                                                        Encrypted:false
                                                        SSDEEP:384:7VOicAD99Eq1HqIbOqWLgBe5lnq+jJqa+k9OdV9d:B9hD99CISbgBon
                                                        MD5:26D7904E98C4826EC8C737C66BDCBC12
                                                        SHA1:7CA4829A3E5F1BBFEDA5E3AEFBC156C39874DA4E
                                                        SHA-256:8C347894CA7949613D31E39D033063A1AF4CF3FE757333C4F1BE2579CF920473
                                                        SHA-512:F1B514950453EA4F92BC5103E0138A23ED6354780A4D29DE127A0E6056C888C320E248B1E2126013271BBC844D0DA8A20E84AD8E9BF757F5B36F75743C552E8B
                                                        Malicious:false
                                                        Preview:......................>.......................4...........1...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.3........................................................................F......I."....I."................O.l.e.............................................................................................................&.............O.l.e.P.r.e.s.0.0.0...................................................................................................l.......E.m.b.e.d.d.i.n.g. .1.2........................................................................F.....8.I
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 21, Total Editing Time: 01:30:00, Last Saved Time/Date: Thu Apr 15 16:16:31 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):30720
                                                        Entropy (8bit):5.045260314109269
                                                        Encrypted:false
                                                        SSDEEP:192:tL7OOnPkQ0hIdHb5xjvNOJMHCdrx38bW/9sn0A/qmDSAmeCDtF2MjTDIRzDwOaUe:tfOEB7n0tPRjTDJxUe8U5Ba2EBnUU
                                                        MD5:452A7EB0E5D50CCA95CD8005C00F58B6
                                                        SHA1:D28E656B06ED04270698665896266CED2D8864B2
                                                        SHA-256:E9B38C68D490F2CDA0F40BBD13DCEFDB49E20954704AEBE1111068C97ECFBBB3
                                                        SHA-512:3078578BC5CBA6866B27E0D8B4B63818D5A776867BD36859AE50B1D78EAED6EE45D68BC1D8FE2B7A12304E04977E53B30A5425409144293DA1FFF93969C2DF27
                                                        Malicious:false
                                                        Preview:......................>......................."...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.4........................................................................F.....*.."...*.."................O.l.e.............................................................................................................".............O.l.e.P.r.e.s.0.0.0...................................................................................................n.......E.m.b.e.d.d.i.n.g. .1.3........................................................................F........
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 22, Total Editing Time: 01:42:27, Last Saved Time/Date: Thu Apr 15 16:17:09 2004, Create Time/Date: Wed Feb 25 15:55:28 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):261632
                                                        Entropy (8bit):1.9491111808148631
                                                        Encrypted:false
                                                        SSDEEP:384:/meSOY8bNrkn5G4LLHPI7AroarCIC7eVl5nnm3PVbWkPTf:umkn5vnHoADnncPZ
                                                        MD5:2BDAB01E7B8095BB8FDEBE7AF3926965
                                                        SHA1:BA9DEB25822C3E374CC2B2E07FE661F4E9502282
                                                        SHA-256:34B8F59F480FCAF32C09E1B8427FAF5E0CF80DC39918B8E1BBF0DAE220B9B386
                                                        SHA-512:7D00C4F622E969B22416AD3C2C5C7A768CD3D95E61109DA061FACD98F7BBD43AA5EE0CA7C600F2FF7B26201ED341187F2DE4C7E2A587ACE2AE1458978F89022C
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .1.5........................................................................F......r.."....r.."................O.l.e.............................................................................................................#.............O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .1.6........................................................................F........
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: 1998 Discloure Report, Subject: 1998 Discloure Report, Author: James Lell, Last Saved By: James Lell, Revision Number: 101, Total Editing Time: 08:02:50, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Tue Feb 22 13:39:32 2005, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):442368
                                                        Entropy (8bit):5.764291489711934
                                                        Encrypted:false
                                                        SSDEEP:1536:gqriKCi4JCS0DlTzwKg3Vj/I+HJL9uEXueM5g2ggLR4BZG3OF6OIIKE85+DN:gq0I5cJXXuQ4
                                                        MD5:4623BE2BABA8AF4A48897E14029EE29F
                                                        SHA1:12F217A06B3ADD4A579D6E6F4BFF0D60D44F256D
                                                        SHA-256:24A472D4FD42007DE58116171D84B77906C90D6781C835CCFFF1F3DD704A074B
                                                        SHA-512:423FD6ECC7F377CAC0EECB7F5B173171E6545FFBAE2964CC33A85114D9D62F783D0ABB6B83C3E00C127A58E74ABDD3CD28B420E503EDAA78B0BF485C22CF7235
                                                        Malicious:false
                                                        Preview:......................>...................................................~...............0...................................................................................................................................................................................................................................................................................................................................................................................................................................S.u.b.d.o.c.u.m.e.n.t. .8.9.....................................................................................................C.o.n.t.e.n.t.s..........................................................................................................L......D.a.t.a.b.a.s.e. .(.T.L.V.).............................................................................................t.......S.u.b.d.o.c.u.m.e.n.t. .1.0.1................................... ...................................0...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Account List, Subject: Account List, Author: James Lell, Last Saved By: James Lell, Revision Number: 47, Total Editing Time: 07:03:51, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Tue Feb 22 13:38:30 2005, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):17408
                                                        Entropy (8bit):5.353280867175744
                                                        Encrypted:false
                                                        SSDEEP:192:en+EcA/aGyp318p8x3Wb5vNxjOJMHCdrYvQqFvAi1mnYuA8Z7Bu7P7Z7b7gUSA7Q:BjASGyp3uNhJ73O
                                                        MD5:1A6030B5072235B0965869D19E08A9BB
                                                        SHA1:BB3A30F534C655B1E2726219CA5BF49B817A2C58
                                                        SHA-256:17098538A0A0EB865ECBAA17D00CFD09AB83400DA70BC9AE467C506E0F05CBA7
                                                        SHA-512:2313A99DA787F451009A3BEC94BD4BFECA8A9FCBCAED3954F2923918B0DC1BBEE9E69E82AC978E864E1291692020F246D22F30D5FEF1EB8BBE78901B516EB3F9
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...........................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Contributions List, Subject: Contributions List, Author: James Lell, Last Saved By: James Lell, Revision Number: 113, Total Editing Time: 12:36:42, Last Printed: Tue Aug 18 20:22:57 1998, Last Saved Time/Date: Tue Feb 22 13:33:52 2005, Create Time/Date: Sun Feb 9 18:04:38 1997, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional
                                                        Category:dropped
                                                        Size (bytes):47104
                                                        Entropy (8bit):5.729017991338511
                                                        Encrypted:false
                                                        SSDEEP:384:gYbjI9PoSInCZuHqSTMRHXu+I3PWoCYnp:gYXGoB
                                                        MD5:A02E3ED15993B8B8CF631068941EFDFA
                                                        SHA1:68609F9F0CCBF698D602F15DF2783ED919B48DE3
                                                        SHA-256:19EEE76FD82EC48C325BC696D85989C20BA39DC4D9903C440ECC8A3A91A9E2CC
                                                        SHA-512:997B08C754A5D0625F39311971BB6113C44EE69F9DB7C3B6D1EC676C9591FCFFD40E428A042A677CB2237DCBE1AD7CDCB463BF721365C9541BD2CEFEB27EDC29
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Disclosure Report Cover, Subject: Disclosure Report Cover, Author: James Lell, Last Saved By: James Lell, Revision Number: 71, Total Editing Time: 09:09:36, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Mon Feb 21 14:12:42 2005, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):102993
                                                        Entropy (8bit):5.775513240751137
                                                        Encrypted:false
                                                        SSDEEP:384:8iPllYflrU4GTGvsz057kQz5xACSYwp3m6MgqGFSIU5DmQ6rfmsduaaahWpQCcxI:ZllI+DQzXAgg3cDtjpM3a
                                                        MD5:D6C23BB2D2B74DE1C9C452C58ECB7477
                                                        SHA1:63409B79C746B01C0F12A76BB511849D77B709A2
                                                        SHA-256:956C888758279B814FEDD7F48D76DFD49F5DF7C75A3FD23FDE0F97BAF0D710AE
                                                        SHA-512:A43BEACAD2716DF068C68F5FEEB529BBBB2D89706ECC9604BF86F422F26558C98C304387CE134408E329D550E0978F385E0825ED15F4ACD88B94095EB0473A96
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Debts and Obligations List, Subject: Debts and Obligations List, Author: James Lell, Last Saved By: James Lell, Revision Number: 74, Total Editing Time: 05:41:49, Last Printed: Wed Dec 18 13:51:44 1996, Last Saved Time/Date: Tue Feb 22 13:38:41 2005, Create Time/Date: Sun Feb 9 19:12:49 1997, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional
                                                        Category:dropped
                                                        Size (bytes):52224
                                                        Entropy (8bit):5.638520545168639
                                                        Encrypted:false
                                                        SSDEEP:384:VA3VCHSQW4z84Bd9CGLVJkhzWRajCIFaydsm4GM:VA3VCyVR4BRyK
                                                        MD5:C5B71EFA6AFA72802DFD0D8055D128D8
                                                        SHA1:77DA5148A255488EB4BD30493D2D3BD6DF11735C
                                                        SHA-256:8F16CC0CB03D6406F4C6A7612F4C9D94D43DA774FC1C6662D76329B177B91F19
                                                        SHA-512:5C8F634210E3E75F0EFF3975112E7C30AD166B1F8067AFBA65155F6339D198F10E5B5CC2D89CBD2422C32E0AA44EE75F4B00E5F3D936C03C360A3DBA1F0F45EE
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Expenditures List, Subject: Expenditures List, Author: James Lell, Last Saved By: James Lell, Revision Number: 74, Total Editing Time: 09:02:18, Last Printed: Wed Dec 18 13:51:44 1996, Last Saved Time/Date: Tue Feb 22 13:38:47 2005, Create Time/Date: Sun Feb 9 19:12:49 1997, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional
                                                        Category:dropped
                                                        Size (bytes):45056
                                                        Entropy (8bit):5.681619568331793
                                                        Encrypted:false
                                                        SSDEEP:192:DNBaBX0B2BUz5jTRE8gxgdPk4tHze8yYWU8M1lt/EsrAmbaplydwDyTgzIF8WPka:ohmNx/zLbkuMC9OqjHWN/VYQBSSu/p
                                                        MD5:761DBD0A2426A34D51F3362C051B37F9
                                                        SHA1:5CC1CC3206398C6D7C121EBD2F676C36E9833A94
                                                        SHA-256:1C0FC5BD6548947A189BED1A0EC51661528A725202E35792D9699C73C095B796
                                                        SHA-512:D437D6041EC1A412415AE1F99EFB040D8E137378A53CCD9B03F26B1CE38C32ED1294C23D7264C6D8FF59CF39D26B9FF86747AFE7AC99EC7CB50DAB89F5F13C70
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Endorsers List, Subject: Endorsers List, Author: James Lell, Last Saved By: James Lell, Revision Number: 45, Total Editing Time: 03:21:14, Last Saved Time/Date: Tue Feb 22 13:38:54 2005, Create Time/Date: Thu Dec 19 13:29:16 1996, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional, Security: 0
                                                        Category:dropped
                                                        Size (bytes):17920
                                                        Entropy (8bit):5.421908987486584
                                                        Encrypted:false
                                                        SSDEEP:192:2LAHPNxk0i2OLPU8GV8BErS8x3Wb5vNxjOJMHCdr5w7lqm9AmAYm9quAm97ZyPbF:W47k33/MrM4A
                                                        MD5:BFCC78606337F1ADD7B87FC8E1C8C734
                                                        SHA1:99B2673556D8A8730DDF60BA15A58BDAAFC9FC4A
                                                        SHA-256:85CE8C392A2E7FEEE7FABE7A1F3E0F70C7F61F0EF20203EA343F025017803EEA
                                                        SHA-512:7CC684AE706896B4D4C624941C7D71E6CF8D4C388FC02ABA50DAA23FDE8F9A145C0E998788FF01A9902AF469103281FC8B378F902BCD5E9DBB21DF2C6FADA27A
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!.......................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Loan Proceeds List, Subject: Loan Proceeds List, Author: James Lell, Last Saved By: James Lell, Revision Number: 71, Total Editing Time: 05:07:43, Last Saved Time/Date: Tue Feb 22 13:39:05 2005, Create Time/Date: Thu Dec 19 13:29:16 1996, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional, Security: 0
                                                        Category:dropped
                                                        Size (bytes):59904
                                                        Entropy (8bit):5.764839915499194
                                                        Encrypted:false
                                                        SSDEEP:384:2VsucDl8+hn7iszAu1YYDJP99qdKjHFCvCiZ/sHxz/JJ2afOj:isu+uu1YY1Pb
                                                        MD5:DEF0B47C2A857A3380C7DD9FC55BD7AA
                                                        SHA1:A42C01237FCEB20AF3C679ACAE403EE64FF0A080
                                                        SHA-256:AC75DAC13D2DA4BB0AA279C8FB4C45EB2235111F30C76602861768147D61ED98
                                                        SHA-512:CBA2B92BEA3EEA5E8ACC866AEE856BEEEC8DFCFF7470E5CDB22C7DA5E0AB48682EBD9966D00B11EAF750533FDFB0409145671FAABA93FEDC1EFAFA6386B7234D
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...............................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Loan Repayments List, Subject: Loan Repayments List, Author: James Lell, Last Saved By: James Lell, Revision Number: 33, Total Editing Time: 02:32:42, Last Saved Time/Date: Tue Feb 22 13:39:11 2005, Create Time/Date: Fri Dec 20 15:00:22 1996, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports Professional, Security: 0
                                                        Category:dropped
                                                        Size (bytes):41472
                                                        Entropy (8bit):5.6245741985399995
                                                        Encrypted:false
                                                        SSDEEP:192:22EQNdickudiauN8dEZEQcAmbUipjatZkLWkC6lnU/c5HhW8x3b5vNxjOJMHCdru:0QN3ub55LOnz1BNdZSkw4fjjfnWX2R
                                                        MD5:D96F0BFA34C620CB0904A5C7CD652D76
                                                        SHA1:8848F994A2873BFA2BC73DFF35A8D1C617575DFF
                                                        SHA-256:367CC798B9F28285A257274083D43D9CA34822AFBD0026BD7A6B407651AF5F38
                                                        SHA-512:5207ACF7F10F23DB57FAB85126A7BE970C104088562128B2D982F9CF23C5177558DAAD6063E3A1897C0A1AE65A46D313FE9C32F4B394434455F00BB0E650D97E
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...............................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 3.10, Code page: 1252, Title: Summary, Subject: Summary, Author: James Lell, Last Saved By: James Lell, Revision Number: 50, Total Editing Time: 06:54:28, Last Printed: Sun Jun 27 21:04:02 1999, Last Saved Time/Date: Fri Jul 9 19:49:26 2004, Create Time/Date: Tue Jun 15 22:03:11 1999, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):93814
                                                        Entropy (8bit):5.439847807690734
                                                        Encrypted:false
                                                        SSDEEP:384:SGmlkmzysH867TSqxdEjuPCPN2ScQ12ScrOgVzRDoYsg7VSclhhy6gGhJA1zfcOy:gtc67TSqtPCV2S0/
                                                        MD5:AE82C60145B9DB14E62CFFEDCFDA30E6
                                                        SHA1:8853BB15A95A0C0BAA23AFC99EC7CDB9303D4974
                                                        SHA-256:164E5BD41A118A0075260EF11CC157C3AE23D6EC287E1C0F6C56AC0D97CBB627
                                                        SHA-512:9189A0A9FD15A60BB293F3DDC9D9DBA1AA4EFBF23C70DB81E6A0CA12528F541ED09CB8B9359CEF9F7367BA05D22FF1C46DE8504154F41147CA00F9B462E74EAB
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Oct 15 14:21:07 2010, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Mon Feb 14 13:42:12 2011, Security: 0
                                                        Category:dropped
                                                        Size (bytes):607232
                                                        Entropy (8bit):5.407342130384767
                                                        Encrypted:false
                                                        SSDEEP:6144:DPJo8DExbYmh3gZ+RwPONXoRjDhIcp0fDlavx+W/WEjGSZ+RwPONXoRjDhIcp0fe:DPJo8DExbuG6GA0
                                                        MD5:B54AEDB3AEEA8EDEF964AB865229C237
                                                        SHA1:D4037247E61D6ECE36F3534F38427E3F59B8B9B2
                                                        SHA-256:9E3BC47402EFBF6F9E1217D2353B4ED2D633E4E0B889A8A14C4D1A2A5F48A67E
                                                        SHA-512:99842D7DAFEB366E76004A6B5306ECCF6EC9AC92E76782F12B94DA6C37EE3552522DA3CE7B1381686B44BA210785959949AB0B2D363D2282F27E2906821C2B2D
                                                        Malicious:false
                                                        Preview:......................>.......................d.......................................}...\...[...Z...f.......o.................................................................................................................................................................................................................................................................................................................................................................................................................C.o.m.p.O.b.j.....................................................................................................~...r.........O.l.e.P.r.e.s.0.0.0...................................................................................................l ......S.u.b.d.o.c.u.m.e.n.t. .5.5.............................................@..............................:......:...............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Oct 16 21:17:12 2007, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Mon Oct 22 19:28:02 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):625664
                                                        Entropy (8bit):4.950657383336972
                                                        Encrypted:false
                                                        SSDEEP:3072:TQrFH2RZraHzLWTkjqEMONv9tKAd0oNhzwcAS66emLo4cOfpkcUd3MDwC6SaHfs5:TmqHeuZgz+OSXG/inxkDo
                                                        MD5:740F31D396DCEF3D05BDED7BD483AFB1
                                                        SHA1:F8F66D67B56C7033DEB75E51521F5A447AD34996
                                                        SHA-256:FBED39F9C33EB26E82A9C20B6F90DE125D74D8168E596CD3D40D00ED7998CAB8
                                                        SHA-512:7F4E86B98968760E6E7DF03FF65E4BDF99B961FB3768C7DB49DA5796302D6F711C3CAB22733FB2B20F84F9222F33E6B849BD6AABE51AB574954A34DC50E9C57A
                                                        Malicious:false
                                                        Preview:......................>...............................................................c.......~...............h...............................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.5.......................................................3...5...........................................|...:.......T.h.i.s.W.o.r.k.b.o.o.k.................................................6...........................................l..........._.V.B.A._.P.R.O.J.E.C.T.............................................................................................>...O.......S.u.b.d.o.c.u.m.e.n.t. .6.8.................................................:...........................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 77, Total Editing Time: 03:30:42, Last Saved Time/Date: Tue Feb 15 18:26:50 2011, Create Time/Date: Mon Mar 22 15:03:08 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):488448
                                                        Entropy (8bit):5.4462079439186635
                                                        Encrypted:false
                                                        SSDEEP:3072:dH3+Wiq7/cnF9G6Hlx/6uGUZdle9R/R1f4qzta896JboUEednkO8X7W:0rG6nSaZHQ4qJa896GsnkZ
                                                        MD5:7AC4C6D7C7069B28B2EB439657BA0494
                                                        SHA1:992D6D9DB36178139DBA882992E2D7ED9C175592
                                                        SHA-256:87046ECB5B9DE39287DFDA261139352FAF81E8CF6A37FDF964A20BD9616FE732
                                                        SHA-512:9716FC62672228B374FB537C8B02621DFAB592A2E8D757A474E001AF154214D1424A5AD9D1BFF70D77862F1F3BC4F681CF4B56DCA388E30B71809915BE0AD2BE
                                                        Malicious:false
                                                        Preview:......................>...............................................................................q.........................................................................................................................................................................................................................................................................................................................................................................................................................C.o.m.p.O.b.j.....................................................................................................D...r.........O.l.e.P.r.e.s.0.0.0...................................................................................................dB......S.u.b.d.o.c.u.m.e.n.t. .5............................................................................`..=....`..=...............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Wed Apr 29 22:15:36 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):192512
                                                        Entropy (8bit):5.007944223673486
                                                        Encrypted:false
                                                        SSDEEP:1536:RktWZ7Ut5HHsDYP8my+MXHwKY0/abtfiYIiVSfaSfV:r45HHsDSMXHwKY0/JtF
                                                        MD5:A7F2BE0A9C76BEC9C49EB1373D5090D4
                                                        SHA1:7369379F50FC341D466CC8A2B28EEDB854AB8C64
                                                        SHA-256:FAA0526CA53536BEB1316741D680356DC81479982B2250C8798D0E6F91FD896E
                                                        SHA-512:05AD1783BD4A2EE920C335CF2AB392C9DB856F15DA13EE7C509F59DB44900B17E93C901A862C540D6267CC75E322989D1C852F661D4E7BE2135D350DBC935EAE
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................V...........S.u.b.d.o.c.u.m.e.n.t. .6.2.................................................!...................................................C.o.n.t.e.n.t.s.........................................................#...............................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:34:40 2007, Create Time/Date: Tue Mar 18 18:36:59 2003, Last Saved Time/Date: Wed Dec 19 20:19:48 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):4794368
                                                        Entropy (8bit):5.157456740228194
                                                        Encrypted:false
                                                        SSDEEP:12288:m9v/Mkrk2keuK63GyEhFKT8Y6IOm8XqQEJj+8fZvR7S/z0Ie2tXK:m98GyR6NKSLt6
                                                        MD5:544DA1BE09475C44146130A8FCB9B3BE
                                                        SHA1:4513DFA718004166D674C9E6573FBBAF9C186B70
                                                        SHA-256:09A127F8DD521F7E1D029B922EA63CB1BD6C75BFF74025C78758500DB481320D
                                                        SHA-512:3DCC434E59EEFA896DBC4BDC97E13D06A4757804BB8EA04F17F7EEA86DB6B5F6C31E1C94867C177A4E84B4756A66678D93F54D4AC2126AFF42B24ED49504D95E
                                                        Malicious:false
                                                        Preview:......................>...................J...[#..............f...............Y...........2...........................).......v...........t.......................!.......S...........................P...|...~...1...2...............M ..O ..............w..."...{...........v.......x.......z...y...............{.../.......}.......: ..K.......F...4....!...!..."..]#...#..U...............................................................................................................................................S.h.e.e.t.3.5.......................................................3...5...............................................A.......T.h.i.s.W.o.r.k.b.o.o.k.................................................6......................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................X...O.......S.u.b.d.o.c.u.m.e.n.t. .3.7.7................................... ...........:.......................P<d.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Wed Apr 29 22:15:36 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):188416
                                                        Entropy (8bit):5.010132586463127
                                                        Encrypted:false
                                                        SSDEEP:1536:OO5mMgUei51+DbPc4MIwMXHwKY0/mbtPVYI9cSfaSfJ:ATi51+DanMXHwKY0/C3F
                                                        MD5:A4F078FF359ADA243E48087C2CF00052
                                                        SHA1:5E12458C8146DD365637A89B5B21930E48C108B2
                                                        SHA-256:861FE0412A7C7BDBC203F4C8E70959F03DF97949DAD70E725CCD6B193E972A48
                                                        SHA-512:250DF78987D7DCC9CD13B17EC00CA67AE5AE23FF0356F7D9096C9F948CEDB1EB334E818BEC3B3E945A5A6F575EDAF7EB42CD3FC2072F043B0797C6B0EAED6499
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.5...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................V..._.......S.u.b.d.o.c.u.m.e.n.t. .5.5.............................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Sep 29 22:25:01 2008, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Tue Sep 30 17:11:16 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):277199
                                                        Entropy (8bit):4.955204919765509
                                                        Encrypted:false
                                                        SSDEEP:3072:A83b1ABghpv/5/vR6xyPk3kHgC6tgd9bA3wOsWU7YoWIGLtXqSEB6Wrp9RdrW+Z+:AQABghpv/5/vR6xyPk3kj8fZvRwY
                                                        MD5:C1C49AEF91B5BD6B09A0D16DE5B5A1A8
                                                        SHA1:3BCEAFC0D57E4806D853E5CAFBDF83C58D9AD543
                                                        SHA-256:68F186EB404BB675258B7A37F436EF8CAE0CE0C99CE99A3E7405AD73014FC213
                                                        SHA-512:1DAD02580762635B05900A44F272F64AC084EEB913B904B9BA69A44E56A116D92B6E73EF4E1A2495441D1D1F6E6678DAA584B1D07116F2BAE0F04A7C3A83AD1A
                                                        Malicious:false
                                                        Preview:......................>....................................................... .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:09:59 2007, Create Time/Date: Tue Mar 18 18:32:55 2003, Last Saved Time/Date: Wed Dec 19 19:22:20 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):115712
                                                        Entropy (8bit):4.729959959151051
                                                        Encrypted:false
                                                        SSDEEP:1536:yYQlKGozYa7z986/yv/C/vABgvp5RhnJvq:yYQlKGozYa7z9byv/C/vABgvp5RhnJv
                                                        MD5:6106AD996499E23B00951728597CCFA9
                                                        SHA1:2A0925E3FA17D899BEACA18C7FDA025CFC23594E
                                                        SHA-256:39165D6F20199D558C3DD18966B64523636C0C9ADA65C4A1BA3A4E8DB9999B61
                                                        SHA-512:6AC84F98E24B1BAF384BDAA7B7DB12BA7B427E895FD1B81EB2B8902820E606227FEC837BB0C2C3519E94F12B16D6E5601FD1EC89235C28CE024CE3C6EE6D361D
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Wed Sep 24 18:58:40 2008, Create Time/Date: Tue Mar 18 18:33:40 2003, Last Saved Time/Date: Wed Oct 8 17:43:19 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):179642
                                                        Entropy (8bit):5.166216624571424
                                                        Encrypted:false
                                                        SSDEEP:768:/pwcx63BOdZ8FNq+cqbVozkajO32K9E9vjwWR9OqQHuqXhoOunwXyRZL7W:6cx/dqFNEqhoA3XwvAF6xnwiRxW
                                                        MD5:62F7E5138E3377191BA9809FD25E3052
                                                        SHA1:AA896EECBB096365E52FC60D1D971EDCE8C45D73
                                                        SHA-256:27BE3E35FBDED425853F321AA82115B85D4E9D03BDA9986F58ED78D174AE3259
                                                        SHA-512:D015AE587566DDB0520C47021684C3F1B373B3A9647445F937B60A6BF1175A22DF4BF41E35CB140999BB58BEAF33D627589F3755AFB84FD04408407EEDE251BE
                                                        Malicious:false
                                                        Preview:......................>.......................................................k........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...%.......&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...].......................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:37:09 2007, Create Time/Date: Wed Mar 19 14:57:07 2003, Last Saved Time/Date: Mon Oct 22 14:25:42 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):182784
                                                        Entropy (8bit):4.952399645110275
                                                        Encrypted:false
                                                        SSDEEP:3072:TXrzxidmGZKpR/V1Z2gnM815Usm8oPKcz4JyKYFf4XgQLtIyumEk/np0aVfUOBGW:5SkIDk6Fk
                                                        MD5:D4132237EB41C001172379B0CFBD2716
                                                        SHA1:F650B72162CFE3C41FBC3BB060A1F7A61025E922
                                                        SHA-256:B639182A4F1DD0297405DB3123413041F130C8358545AEBB8346132FEC5FBE1C
                                                        SHA-512:4027D8DD1303EB2A2BF0274F4D62AA38553B2C2520F448BDCA49B0B84DB5E4CD80A5BC172E2FB77EEC0F6B47BFC3E24BD056EDA5154B5D6FCFC04030F40CB26D
                                                        Malicious:false
                                                        Preview:......................>.......................................................n...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:08:58 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Mon Oct 22 14:29:10 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):185201
                                                        Entropy (8bit):5.240949811968868
                                                        Encrypted:false
                                                        SSDEEP:3072:lZ4aXxE0IeiZAqCfBFANfkF/CamYMfXFpAaZ5mSAAmTvC8s7GopsOG+8F/I:a
                                                        MD5:CDDFB8A098D01B326568A8934542E6FD
                                                        SHA1:810056460BCD69778469E80499B1B8A5ABF10689
                                                        SHA-256:23EFA47355AC238926FDD2F156959CB828F3B56F233B32B6191E590620D845DF
                                                        SHA-512:17F5AAAB78AD19DA3B44260E3142E928558C1C28BD30DC0357D2E841072BC88AE9ADC08C0479F7D14C79190A4EDA814FE81D8DDD4AA802B1A77BCEAFD60675DE
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...[.......\...]...^..._...`...a...b...c...d...e...f...g...h...........................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Jan 3 14:48:09 2008, Create Time/Date: Tue Mar 18 18:37:23 2003, Last Saved Time/Date: Thu Jan 3 14:48:33 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):168448
                                                        Entropy (8bit):5.202527529762482
                                                        Encrypted:false
                                                        SSDEEP:3072:6urIsxEywEw+001sKJY0yNnQiawtVanTTWukckYPSKjggF0M61LIiOIE1zeG9GXn:+yp3
                                                        MD5:921173462DF6CC5BE5AA6E7F1C9F19D0
                                                        SHA1:64A7090A11E0DED04E3F13AA70C0AED377DB0EDF
                                                        SHA-256:CCF9CC5D1E823E08443BE7ADCD00B20B2975B694226DE83CE4D66F8A2E7F985B
                                                        SHA-512:BBF4A1E7380D727BA46223032CBBB8FEAB208C08291DCF5C588F205628FEC74672EFA2A61A03B9EE302E02811245C1A335D2D3E2D5A29E47EA6D2270AB519BC3
                                                        Malicious:false
                                                        Preview:......................>.......................................................H...[...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Apr 13 20:48:40 2007, Create Time/Date: Tue Mar 18 18:36:01 2003, Last Saved Time/Date: Mon Oct 22 14:45:49 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):150016
                                                        Entropy (8bit):5.205596829097363
                                                        Encrypted:false
                                                        SSDEEP:1536:2W6NZmGBWou83Gngj6uPMzsWT3fki8oaKo/M4iTuRR:2W6NZmGBWoBGngj6uPMzxB8oaKo/M
                                                        MD5:A088F0800E0E423C554231B891E59390
                                                        SHA1:C345820606D84BB6529876F4F02D82C25DE22707
                                                        SHA-256:C7AB5E1C7436A1A4C405A77975716247FB177B19AF52DD58E8275B68A524E3B9
                                                        SHA-512:CE0D4E040DC1426274E2BC96CC3F997866EEE53E8A6CF8E77246E38E9C2D537A32FBC2190657667E047994DA39A0033F75D2ADFE9BA1A29881B40D1DDDF98882
                                                        Malicious:false
                                                        Preview:......................>.......................w...............................y...H...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:12:11 2007, Create Time/Date: Tue Mar 18 18:36:29 2003, Last Saved Time/Date: Mon Oct 22 14:51:19 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):206658
                                                        Entropy (8bit):5.156970374644571
                                                        Encrypted:false
                                                        SSDEEP:3072:gMPxdYIMwBzRn3Y5LoGMicjtGTD8x/0LUdheW/zXni8yV5Gr920W8y8a50032gSs:EKhK
                                                        MD5:B6C3CE1000718B8957385CAE877FAEE5
                                                        SHA1:0725EA60150FBA6EC4D98719193AF6A7212B609C
                                                        SHA-256:5D45D44FFDBEE1BDEAFD1082651EF382164B646F75C53720D0D37E1FEB9C1BEA
                                                        SHA-512:0D29BBCF4DBBD8E1DB670D662BB3471E315DFA90DBF23D36E921B39F7A98E8A5DED836CD2E4AB643FEF9039D8F68A2D0C2EDF440967D494EFDF30E59EA29C0EB
                                                        Malicious:false
                                                        Preview:......................>.......................................................S.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Apr 12 20:34:40 2007, Create Time/Date: Tue Mar 18 18:36:59 2003, Last Saved Time/Date: Wed Dec 19 20:19:59 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):207407
                                                        Entropy (8bit):5.130835054236678
                                                        Encrypted:false
                                                        SSDEEP:3072:6mmZR4NTY+fBFvgipoLoJtpu6ndNVE6JsjNNKuX4Nrr9fO0Ehz0tmlgkArzOQAI5:6b8tx
                                                        MD5:83E657E047E43622F4BBCEAE2E3ED26C
                                                        SHA1:6B57E3230F7EB72E477AEDB6E48414E756108C2B
                                                        SHA-256:CBF8CC5001E9509BB035677C6106EF50B74AF9146FDBBD6CB1A2D273A59C7C93
                                                        SHA-512:D6514F1D0BF39089B7DE336BFA0BAC1983E006373CFAC35BC8F03D6A656F8CE1A40499558F8289A1D0D1727C3D3662E9AA169ABE35E033C4DE814CAC37F8FD69
                                                        Malicious:false
                                                        Preview:......................>.......................................................H.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Wed Dec 12 20:36:55 2007, Create Time/Date: Tue Mar 18 18:37:23 2003, Last Saved Time/Date: Wed Dec 19 20:23:26 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):165376
                                                        Entropy (8bit):5.204630458042751
                                                        Encrypted:false
                                                        SSDEEP:3072:JQZ7yok/viUkLZqhZnQeGfJDLsPO46kG/B+:Ig
                                                        MD5:6742E11F8276F6F9B4310F9A505922C6
                                                        SHA1:B63BD30E24C7310953E5C93E24FD41E32E742902
                                                        SHA-256:DF570C2774335D78B52FE6F814C2CC28EC7A550D779E1FBAC909BE924F319977
                                                        SHA-512:76E07A69587EF15CF26071D0CE3FD7438182F779AEB85EDEEB8512EA81DFF949FBF6D49B1D83F5A7BD2F11C29C2686D5B01F75C7563E86D1971762CEACB5F75B
                                                        Malicious:false
                                                        Preview:......................>...........................................................U...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................7...................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 77, Total Editing Time: 13:19:08, Last Printed: Fri Nov 19 19:45:23 2004, Last Saved Time/Date: Fri Jan 21 14:19:25 2005, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):87552
                                                        Entropy (8bit):5.292860622249849
                                                        Encrypted:false
                                                        SSDEEP:384:0IVAgpIDVV3pdY7J84+ZEHnUzmLmCnFJBPncQ5olvPmKgTQVbDpdTC0xIBpIlxyi:UBHpS64+ZEHn0CnVPncxcA
                                                        MD5:D57ABF650F3A7C4ABAFE3A95464A576E
                                                        SHA1:888CC2AB4F445D3C25F5030ABC91839D7A75F015
                                                        SHA-256:4F11CC3F6D5DBA4EC2B1A05ABF3819BA081F21131B80F092F0E8A4EC0E8109A4
                                                        SHA-512:C46831025A5856D9559A9EE045105931441F2EF813202FCA6DFD7E33D71CF63175103BAB94E4F0F07E98E66E21746B182C9F550942E3CECBCB655437FC48509C
                                                        Malicious:false
                                                        Preview:......................>.......................@...........0...................................................................................................................................................................................................................................................................................................................................................................................................................................................................E.m.b.e.d.d.i.n.g. .3.2........................................................................F......5....`|.5..................O.l.e.............................................................................................................8.............O.l.e.P.r.e.s.0.0.0....................................................................................................:......E.m.b.e.d.d.i.n.g. .3.4........................................................................F.... ..5
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Thu Oct 2 21:58:32 2008, Create Time/Date: Tue Mar 18 18:38:43 2003, Last Saved Time/Date: Tue Oct 7 22:00:07 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):179200
                                                        Entropy (8bit):4.971791860235385
                                                        Encrypted:false
                                                        SSDEEP:3072:8gDFkCHwgaAaIpyGreKLZOpjlbu9yz1LCAcZ/8z5tSZOcOtuA8YLahxbRvaZJSCf:8Qcjwf
                                                        MD5:C39EC68DC1C973913E5680996790FE4D
                                                        SHA1:D9EB6D942E3F5F7901D9242F8C63A0982090544F
                                                        SHA-256:2F1987D27D8BF22DAAC561C2C7A078BCC9EAFA35414ED36C624A6E72A1FED69B
                                                        SHA-512:B97B290FF58EF29C3A29282FFAE0E878A3232BA2F6EAF7368BB5A75643E32BB7BA6F3BD2F756AFF772CDAAB0434211F61C1E1AC8C92098A8810034CA872C5264
                                                        Malicious:false
                                                        Preview:......................>.......................................................G...............................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.2.......................................................#...%...............................................Y.......T.h.i.s.W.o.r.k.b.o.o.k.................................................&......................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................U...y.......E.m.b.e.d.d.i.n.g. .3.4.............................................O......./... ..............F....`..y
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Nov 16 20:33:18 2009, Create Time/Date: Tue Mar 18 18:37:23 2003, Last Saved Time/Date: Mon Dec 21 15:58:40 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):258048
                                                        Entropy (8bit):4.950934717075591
                                                        Encrypted:false
                                                        SSDEEP:3072:1P1JR2biO95hFqzw8mFJjefgL/ezzrUt6rDTUVykn3T+sNdhKnJgHxXbyjQYmxFQ:Xu
                                                        MD5:D46A8E06CF758CE784DAB6A346C18CC2
                                                        SHA1:5FC8A9A21870F50138241F374A9EC4F81C308827
                                                        SHA-256:EFB54DCAA6451E8820004655327485E7A9C76E57766819A3285B29536F0AD5B2
                                                        SHA-512:1E2AC43866C5C3AB826955DAF76FEDD6C1DEACC48D208F28DF68E7DF46C7AF4D48A10F5298732B5AB8485F065F40542329C4CF93A77756E30E2325FFF01B49CE
                                                        Malicious:false
                                                        Preview:......................>.......................................................r...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................l...............................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue May 8 15:48:55 2007, Create Time/Date: Wed Mar 19 14:57:07 2003, Last Saved Time/Date: Mon Oct 22 15:14:45 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):186880
                                                        Entropy (8bit):4.934801965469349
                                                        Encrypted:false
                                                        SSDEEP:3072:o87jT9+1SaVWBR7VFlScnEQVJIwqccjmUr0tGCMhH0bgkbVci2REk7EXX6lHMqVX:oMjkDkPHk
                                                        MD5:3C139956F2E1AAAC4FBA589907644095
                                                        SHA1:E1E86F73DAEA1EDD3B5C1361DCEC1DD2A7B42697
                                                        SHA-256:F1638B572DF258D7BB77E2F4DA6CF00B30DCCB40A5B43DBB82B251673DB41559
                                                        SHA-512:139BEB1D1FAEFBDE2EBB39909102444BF87A5A64E8AAF1269C3B7AF930FF5413FC5ED33AFE346ED40C26C955BA98C7AE9862F8A121E7476983835BE2D994CB9B
                                                        Malicious:false
                                                        Preview:......................>.......................................................n...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.................................................................................................\...................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Nov 17 16:11:09 2009, Create Time/Date: Tue Mar 18 18:39:02 2003, Last Saved Time/Date: Mon Dec 21 16:03:24 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):253952
                                                        Entropy (8bit):4.88787880649354
                                                        Encrypted:false
                                                        SSDEEP:3072:4OpY1fX4D+QYNyPyELBJ6s0HBp08DS/X/UMmoDX48jp+oUP1jRnx+Us/56AxRqm4:y02Zz
                                                        MD5:BB8CEB43E879AFFC33789AB3A02C78FA
                                                        SHA1:0C75F019D84546AF18C10B0CB4DA2F4F41D43DAA
                                                        SHA-256:1A9EA3240F75F09A639DA23CADCB1523E6EA5C9D3E37DC3D1AEC8D309D29CE1C
                                                        SHA-512:E64DA3919089C1F32CB9F53C7A1A0647D477D84AFE48621FE0318770DB17E324E6A782D50E85556F139D509D45A2EE1A7A7334C9E3E07A189A15B8FC9BCC9F1F
                                                        Malicious:false
                                                        Preview:......................>.......................................................]..............................................................................................................................................................................................................................................................................................................................................................................................................................................._._.S.R.P._.3.......................................................+...-.......................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................u...........E.m.b.e.d.d.i.n.g. .5.1.............................................[.......7... ..............F.....T0.
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: Template, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Wed Dec 23 13:23:38 2009, Create Time/Date: Fri Sep 18 14:41:55 2009, Last Saved Time/Date: Wed Dec 23 13:29:52 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):221696
                                                        Entropy (8bit):4.852220976251422
                                                        Encrypted:false
                                                        SSDEEP:3072:lyx6XPLzL0eeyD3xPNkzv5OLJYFRydDaQTD6lo5wUixc2CwfVzkFt4htDDXPUK+8:cxPk0v
                                                        MD5:F75B99D5796990BA2E531D625E00FB2E
                                                        SHA1:4CC6F255FB99858909B7CF37476F3822678C0F6D
                                                        SHA-256:DE6274B458ABB143F4832E93E7BE4D8C13044204ADB442A235D8DCA18A06C860
                                                        SHA-512:EB71CE8F3641C01551EB9AD28D6B746028D8A5786F3C055C9C7F6106318E0A10572C8A902AB080AE39EA8E33DAFA03AC55383039E05179B66271172D0AF8EA10
                                                        Malicious:false
                                                        Preview:......................>.......................................................r...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jul 6 16:30:49 2007, Create Time/Date: Tue Mar 18 18:39:25 2003, Last Saved Time/Date: Mon Oct 22 15:23:52 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):209920
                                                        Entropy (8bit):5.072464260495382
                                                        Encrypted:false
                                                        SSDEEP:3072:HLIBwkq9NAIoSzQ0S7SIZGBRA4R7BnRMbp9Rt7rG6+sdoaSYt9awFUYBaNERBAQU:r8t
                                                        MD5:2FBD7AAF164C869883BEC2BCA05010A7
                                                        SHA1:FE725E820949A2C5D065ECFE0DFA0E8AE7A69F5B
                                                        SHA-256:3DDEDB67316FE565FFAD865ED2D6DD574C3D6AA230A35E20C7E1C01344C8E0F1
                                                        SHA-512:7AB12BBC73486ABFB52D94C147B70981B90271609AAFE45BD25535F28B2A53179A389670758640D839A3A8EC67E6A615599008251887E3C9BFEF71AC13E421C9
                                                        Malicious:false
                                                        Preview:......................>.......................................................I.......l.......................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:31:24 2007, Create Time/Date: Tue Mar 18 18:39:46 2003, Last Saved Time/Date: Thu Dec 20 12:45:54 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):225792
                                                        Entropy (8bit):4.958937507406109
                                                        Encrypted:false
                                                        SSDEEP:3072:HlrC1rCMbggED9nSChJ5BGPIrjTG2ldhg4Z0TlLFhd7pq753VLW3wLEdZGGS+F0y:UxV
                                                        MD5:CD5E5B4E39ECA860862276250E7F25D2
                                                        SHA1:531B5ABB29CEA928C9CCD01B0C721AA0188F342E
                                                        SHA-256:908A0E47CF765F28A66ED79EC769792FA715CBBD3861EBAD833CFCE93375FCA6
                                                        SHA-512:E9A2AFFB0DC8ACD871E13E777CD09A5C9E4BB912252AFC4AB4EF40E088536E5DFE54CE4DEDDF5BEB8B1ABC64CDB221BDF3F96DED417B191038EAA22184848B7E
                                                        Malicious:false
                                                        Preview:......................>...................................................W...Y...............................................................................................................................................................................................................................................................................................................................................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k.................................................9......................................................._.V.B.A._.P.R.O.J.E.C.T.................................................................................................q.......E.m.b.e.d.d.i.n.g. .5.0.............................................p.......J... ..............F....P.D..C...E..C................O.l.e.................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Apr 13 21:15:00 2007, Create Time/Date: Tue Mar 18 18:40:06 2003, Last Saved Time/Date: Mon Oct 22 15:34:20 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):149504
                                                        Entropy (8bit):5.15953513117498
                                                        Encrypted:false
                                                        SSDEEP:768:Ycv3JYOB0T8OEpgwJmvmEGcDKCwaEzJGmG1OnS6fJwaEPz54:YiO8OEp30vOcDKtPVGmGInS6fWPPC
                                                        MD5:4C745F24AB6AD29C007BBCC4ACBD0192
                                                        SHA1:5A40DFC1CE95AAFD3869E55A91250239A35A2944
                                                        SHA-256:DBB69B1CCE9B73FAD9CE55FF4E340131AA3DFCCA7C641551E5CF6FCD586CD4EF
                                                        SHA-512:9001287CF61BFDFF81B20F6864FAAA3A2EC7DA7D278D411130CE1C89086E38DE643FB9D402C09D3B203009E181B57013D6A9A3FC13C213DFE19DB0D653C09B4B
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:45:28 2007, Create Time/Date: Tue Mar 18 18:40:26 2003, Last Saved Time/Date: Thu Dec 20 12:49:10 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):146432
                                                        Entropy (8bit):5.063673625152432
                                                        Encrypted:false
                                                        SSDEEP:1536:BGf37BCzwSJ43KyN3DEXrz4wn7KKgKLli1+49:Af37BCzwSWKyN3DEXfn7KKgKLli4
                                                        MD5:16E2E8C47A83FA4CBA0EF9969DD3EAEA
                                                        SHA1:7B9CF6EB74205A42A27166F24347F17433AAE122
                                                        SHA-256:30D816129634F858170327E77DDD28C02F631FE76EAC00D28434CA167E635C57
                                                        SHA-512:046C63E6135EC52EEEDA975A69BC159E004A5EF58D6729C6766E28AD56B5599AA5F3495F8AA0B9ACBC13D523B1F71B9DC0CD7F5A828DE1069879206A4287DE33
                                                        Malicious:false
                                                        Preview:......................>.......................{...............................}...J...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 21:22:12 2007, Create Time/Date: Tue Mar 18 18:40:48 2003, Last Saved Time/Date: Thu Dec 20 12:51:53 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):143872
                                                        Entropy (8bit):5.048937898720221
                                                        Encrypted:false
                                                        SSDEEP:3072:SEgHKAt1aapBgC9y3Nu/2eX76vUbBKYe/CTLlm1:SEgHKAt1aa1/HKF
                                                        MD5:37BF265114AC548A613E0F811A4E14AA
                                                        SHA1:7EEBD6C38835BC0E2561D3CCBFD0682E5C125889
                                                        SHA-256:27ED2A6B9FE0961396D609EC771E13FB96AE8771BDD125AB45B0849224CA9A91
                                                        SHA-512:D9C9F8EE1C66C2255C9A03057FA29563791A4309E6B299D91B83190EC06F173247DC2B6883C4C403AEA20C75774D567F7D1D07D09A4398FBDD2069CC6CD744BC
                                                        Malicious:false
                                                        Preview:......................>.......................x...............................}..............................................................................................................................................................................................................................................................................................................................................................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................U...........E.m.b.e.d.d.i.n.g. .5.8.............................................5.......!... ..............F.....hO.C...hO.C................O.l.e.........................................................................................................................C.t.l.s................................................................. ...............................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: sboetest, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 20:56:44 2007, Create Time/Date: Fri Apr 4 21:28:15 2003, Last Saved Time/Date: Thu Dec 20 12:55:10 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):131072
                                                        Entropy (8bit):5.157600548856342
                                                        Encrypted:false
                                                        SSDEEP:768:2AuLeepR5sEeSGQk9dq7WEbZFFeQkhwX06timb2/WxDjVaj6gKQk2nuKQ:2AqbsEeEPbZFdYS0K2/Wx/Vaj6m7a
                                                        MD5:1AB6467BB94BFA8E94830B2C7857ECEE
                                                        SHA1:D0571B1EEEA6411F837FBF725F2365A8C52F022F
                                                        SHA-256:14F8DEB2F3CA26B3B5890CA042D3BAE02080A105789EB05504DFE0B956285ABF
                                                        SHA-512:FEDC72819025644B7CEBC93C1AF7008E2F4E05C5ECFDF2E62947705CD0B7F8CBF13C33CD27BBC68A50DFDE27AE08514D0E62125EBFD02BB9ED1A22C8FF76326D
                                                        Malicious:false
                                                        Preview:......................>.......................o...............................r...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:57:10 2007, Create Time/Date: Tue Mar 18 18:41:35 2003, Last Saved Time/Date: Thu Dec 20 13:08:22 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):196608
                                                        Entropy (8bit):5.043187868752451
                                                        Encrypted:false
                                                        SSDEEP:3072:OFoAmv0dDkBDZ5DolqUzTHvUmq7qAap18NCXxrJftxOqfUCfOWenNZwUq73aRYdH:0x7wkZ
                                                        MD5:B3A51CE1A4426170A893BD555B37F02E
                                                        SHA1:863DF9EB5D3CEBE077CBF887656E86B7E4D73397
                                                        SHA-256:0924764EAABC8A2D479EB9DA07A9B03780F3382C8DE6B72BE6DFFFF346607A34
                                                        SHA-512:D9A1FB8C6362B17494574D9C718C931FE7DEA85CD0420180B0A48196AF1568E6CCD9013D1E03339AA0E2D903EC57555314105B1EEAE5F4447707D6CB9EEE94D0
                                                        Malicious:false
                                                        Preview:......................>...................................................M...N...............................................................................................................................................................................................................................................................................................................................................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k.................................................-......................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................s...........E.m.b.e.d.d.i.n.g. .6.0.............................................X.......>... ..............F.... ..D.d.....D.d................O.l.e.................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 116, Total Editing Time: 1d+04:18:33, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Tue Apr 5 12:05:46 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):334424
                                                        Entropy (8bit):5.342674465414266
                                                        Encrypted:false
                                                        SSDEEP:1536:7jO3+tEK0cDamfB2LkNBn0FVs3J0E43q0cmfB2LkNBn0ICGcLI4DMHdjuTEzrIIw:G32EKF6VEJ0EtKCGH9jGEz0IeSdq
                                                        MD5:F17BF9315C6397B804496247421E8E24
                                                        SHA1:3DF470B8684DAC414FF7D6AF3175AA35A14B84DC
                                                        SHA-256:98605AEE454F9557B227622FB414270301E4F63B79947D766129DCE16CD17E66
                                                        SHA-512:B45CACD79F16664A2923635F70083130AA9C6637B6A1AAACE52670DCE21D28064C682CDC751BBE188CBB0544AB6861587836435DABB6188DA865AB795AE2777D
                                                        Malicious:false
                                                        Preview:......................>...........................................................r...s.......M.................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0...........................................................................................................E.m.b.e.d.d.i.n.g. .6.6.........................................................0..............F.....}.j.....}.j..................O.l.e.........................................................................................................................P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 21:26:45 2007, Create Time/Date: Tue Mar 18 18:43:28 2003, Last Saved Time/Date: Thu Dec 20 13:16:27 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):170496
                                                        Entropy (8bit):5.077195832841005
                                                        Encrypted:false
                                                        SSDEEP:3072:lg6OZuzT6RBP01esKcdOPfsL2FVrm57oQ+a:7/k
                                                        MD5:403056F1D56084DC1034682F28C069B2
                                                        SHA1:552AED44B6D7CD1D691B4E519C89DFA37764FB5C
                                                        SHA-256:EC17AC16E8F9F10D26357F53A3ECA16C2E3692B07D0A0B49F8618BC3C7F5595A
                                                        SHA-512:30F5900C8777AED243911549BF7113F10722B74A303AA8D79B83BE9D59221E907307587CD4E2A0186BE3EE756F8259D786C58D6C2D95E80244C2E220E907FA0E
                                                        Malicious:false
                                                        Preview:......................>...........................................................P..........................................................................................................................................................................................................................................................................................................................................................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................(...........E.m.b.e.d.d.i.n.g. .6.6.....................................................1... ..............F.........C.......C................O.l.e.........................................................................................................................C.t.l.s.................................................................0...............................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Dec 11 21:08:44 2007, Create Time/Date: Tue Mar 18 18:43:53 2003, Last Saved Time/Date: Thu Dec 20 13:19:54 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):122880
                                                        Entropy (8bit):4.960800429743342
                                                        Encrypted:false
                                                        SSDEEP:768:54C7x0agTFz+OSXG/inAMXOFwPSZcP74zvD8QrqFrQDYB:5LEz+OSXG/inzXOFCSuD4zb8Q8r6YB
                                                        MD5:909287CDC971C0D4B31C5D32B688A6BC
                                                        SHA1:EFF5CE5BAC01F247903A402BBDBF409EFF9B725C
                                                        SHA-256:31BD8F97745B70084DC405A219C9ACC90E0C22580CEAB06486EF13B3789EC639
                                                        SHA-512:6D7D694DF5904D20C44195DCD9905A239BB1B8632EC03D7D90787F7D351A82EC56429DA6E22E8A2F9BBA74A2C2ACDA8A70D99F76C8E6BF01FD4604F159F07490
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.0.......................................................................................................|...........T.h.i.s.W.o.r.k.b.o.o.k.............................................................................................l..........._.V.B.A._.P.R.O.J.E.C.T.............................................................................................?...=.......E.m.b.e.d.d.i.n.g. .7.4.............................................)........... ..............F.......6
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Mon Dec 10 15:38:38 2007, Create Time/Date: Tue Mar 18 18:44:11 2003, Last Saved Time/Date: Thu Dec 20 13:21:49 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):181248
                                                        Entropy (8bit):4.919450248953279
                                                        Encrypted:false
                                                        SSDEEP:3072:utTgm+uUSbiaPH82Yy1uK8PJRG33hD2Hutv+Ud1mXtNB61s+X2Kp5AKSFGAtjm3R:5Ha8Dm1
                                                        MD5:1A1174381B327B0BE6AEA5AFD221DB4D
                                                        SHA1:5E005EED30F08BCFDC2DC666DC2E54D4AE9E2BE7
                                                        SHA-256:5EA0AC5B9592134749833BB0803ABC6BE782C7FD57CFD0971A7E2E9B80CFE20C
                                                        SHA-512:AE7EEA2A39429B0EB694039026329F252B3ADEBC0DBB6E444E9319DEEAE0F6582D45F6F181DA25CE82634505AC075C49F2168EFF0B9BD46A57662AF042CD7FD5
                                                        Malicious:false
                                                        Preview:......................>.......................................................p...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 55, Total Editing Time: 14:49:41, Last Saved Time/Date: Tue Feb 15 18:01:58 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):158720
                                                        Entropy (8bit):5.268140724248468
                                                        Encrypted:false
                                                        SSDEEP:1536:HZLzpe9R/R1gGWx2oLnq0qwA1s3A85Yh:5Lle9R/R1fEqzt8
                                                        MD5:4882CF47C2091D38AF98D8287394A284
                                                        SHA1:0B4F8D02922F66C946ACBE312382E06245C8C040
                                                        SHA-256:03C156AF47054845AB03DAC77350A3C34D013E332EDC8E6596978B46FEB05244
                                                        SHA-512:9554817DB5026E3F4CC350FAFF41BC2C7DB39A452B1549B6E4184F1FD6FAE828C200FF684D2532BCFCDF5CB6D242E6577CAFA4006347140BE790E10885CD93B3
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only).....D:\VersionControl\SEIMS1.0\Development\2010 YearEnd\Applications\CR Code\CFRS Common\CF_Common\CF_Reports\2007 Forms\cro-2210A.ttx..........cro-2210A.ttx.............................................................0.......................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 135, Total Editing Time: 1d+04:13:02, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Jan 3 19:00:05 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):103936
                                                        Entropy (8bit):5.592327674224524
                                                        Encrypted:false
                                                        SSDEEP:768:zeHskQ4XJukQLWS6lZaqkbDdHkdxkBNox3XRXhTBPSWlPGRCAIIrZTretmXV8hBv:zuhX/6uGRCOX6HHFxGXF6DwNS
                                                        MD5:2AB980981BB08FC87E4B8E885C775867
                                                        SHA1:F72DF109611C6E5A83BA7282C9E8E9ED4E4D9B1E
                                                        SHA-256:3A11440931E4AF31F03346CAF6DEB28AA9592A50B12126DD434D708D4EDB1C39
                                                        SHA-512:B6FEC7CCFFE987A8C4A16A15714014565B6CB19F55ACEBA887336DF297706FE23AC0BA3148BCC7821CB4664187B614FCFB66E0A601BA08F1C049F4A4E0320A13
                                                        Malicious:false
                                                        Preview:......................>.......................}...........|.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................dB......E.m.b.e.d.d.i.n.g. .3.1.........................................................0..............F.....>.nx....>.nx.................O.l.e.............................................................................................................1...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 174, Total Editing Time: 1d+13:39:25, Last Printed: Tue Nov 2 15:30:29 2004, Last Saved Time/Date: Tue Feb 15 18:24:24 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):222452
                                                        Entropy (8bit):5.4064762014400065
                                                        Encrypted:false
                                                        SSDEEP:1536:kp1HN2XddW26XOTh3B0Zld7gpi1ELoAdMLg6:kp1H87WtOL0j6pOmFWM6
                                                        MD5:FADE02A6571C1E7B61F7D2912843299B
                                                        SHA1:5B02062FD22BE8F768CE81B7F6500D0658DD6447
                                                        SHA-256:CAECEBCE8CF9785948FC753AAD941939A8644C61DEEBC32DB66BD020FD60B219
                                                        SHA-512:013E9CC58F5F0EC7C379777CFFA5D25A27EC1673F861A4A52F746E6AC63C8231B8969F7D03E3E63BCA6E531FA2B7657BF0E38B05429BEEF5BFF4D1F59E5BCE2F
                                                        Malicious:false
                                                        Preview:......................>.......................................................'.......v.........................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................+......E.m.b.e.d.d.i.n.g. .4.1.........................................................0..............F.......=......=.................O.l.e.............................................................................................................H...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 56, Total Editing Time: 14:47:29, Last Saved Time/Date: Tue Feb 15 18:02:08 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):163840
                                                        Entropy (8bit):5.228829883731787
                                                        Encrypted:false
                                                        SSDEEP:768:dg+RR+r9hPq0TcyUwDFOkZ8E7VFFyhufjMVok2HKrs0yhjtLvjMVokT6X4GyBBC5:dg+R+y6s6oagYnysA0VWeDm6iE43qf
                                                        MD5:F51BEAB10802D8F46CD91524C29A78A9
                                                        SHA1:825EC58150D825C5245F1FFA0AAE8A8E39EACD4B
                                                        SHA-256:2D4E4ED8AC8175EAE07D880B467815C561E31410E75F33CABA41CD16534E71AE
                                                        SHA-512:60B5ED2AA7DBEFEE444B6B12110A80104B5C6EBAD2F82B9CF73939857AD255F4EFC419766BFAF63B8AB8D1EC48C14996082C7E3F4309CFE151A82FC2B4C15D23
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................eld Definitions Only).....D:\VersionControl\SEIMS1.0\Development\2010 YearEnd\Applications\CR Code\CFRS Common\CF_Common\CF_Reports\2007 Forms\cro-2310.ttx..........cro-2310.ttx.............................................................0.........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 122, Total Editing Time: 1d+03:59:21, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Jan 3 12:16:34 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):83456
                                                        Entropy (8bit):5.617886733447368
                                                        Encrypted:false
                                                        SSDEEP:768:kLjO/+KGidgXJBPjjZTX4BPBPn5925VhljMVokLqhdXpBPNZXP8h:kHX/ZX85/5scqhdXfr
                                                        MD5:E708CF7FC5A36DCFB21C4C71D3D3830E
                                                        SHA1:524E043B77C72E1AF8DFE79029FF4843EC93693C
                                                        SHA-256:E1D8DA0491FFE506F325D2FE0A0292A3FE1A3700CA1D8A2E780876E8E4964D7C
                                                        SHA-512:C5A59C922BDE6E6BF36AEA1A6655E4A6743DE391721B233FA1BB54F8A82BA9066551F8815507CC01E25DE00D6800D4421071CEE65591D042FA9476ED04847BBE
                                                        Malicious:false
                                                        Preview:......................>.......................d...........c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0...................................................................................................l ......E.m.b.e.d.d.i.n.g. .2.8.........................................................0..............F........@.......@.................O.l.e.............................................................................................................j...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1252, Revision Number: 133, Total Editing Time: 1d+04:11:03, Last Printed: Wed Feb 18 17:48:15 2004, Last Saved Time/Date: Mon Jan 3 13:05:25 2011, Create Time/Date: Tue Feb 17 16:19:41 2004, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):104448
                                                        Entropy (8bit):5.571042801433939
                                                        Encrypted:false
                                                        SSDEEP:768:hkvnrY8fsuk9LCS87Q4kh6+ubXbFiNExN2HXbdBP+VtzY1g5pL8lQM1KXVTBP657:XNyNOXbrctpUKXbuT4WhZXF6Bqn
                                                        MD5:A0C044D33CB4F0DB844EC13C156BDF6F
                                                        SHA1:9FC9F3526F3E9785B898BBC239590DED15AF9AE0
                                                        SHA-256:82EDAF0D98E22A5BF59CB851687DDC0DE7B974DA2BC10AA528BEBA1BEB0F5064
                                                        SHA-512:832F30833ABA02BEF0172AAC47175D9B9A16C3B50AEAC12DD8FF01F13D215DC18BB39A1113EE785C4C3A310B07886FCFD361F76A2A2447A1D77507B17471D34C
                                                        Malicious:false
                                                        Preview:......................>.......................~...........}.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................B......E.m.b.e.d.d.i.n.g. .2.9.........................................................0..............F.....$..F....$..F.................O.l.e.............................................................................................................1...........P.a.c.k.a.g.e...........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Oct 15 14:21:07 2010, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Mon Feb 14 13:42:24 2011, Security: 0
                                                        Category:dropped
                                                        Size (bytes):252750
                                                        Entropy (8bit):5.25060703850526
                                                        Encrypted:false
                                                        SSDEEP:6144:YZ+RwPONXoRjDhIcp0fDlavx+W/WEtZ+RwPONXoRjDhIcp0fDlavx+W/WEp3FZ+m:kGo
                                                        MD5:D386DF49CA08E8BC94B632AE6BEF1DB1
                                                        SHA1:4D236FB675BD56A0CCB979BB26809A6278B45C58
                                                        SHA-256:6C7F2A579D4218ABF8375315255417A740D4964E9DE361B6B00E9F6BF1E4AB92
                                                        SHA-512:44BEC47D9E91DED6E741D82FE4C0D98E73A109CD5A9E9543FE47DC1A28D0619E9CB20F607C30BD620918EEE34AA813253DE302A339435EC7835E7BD3081EAC92
                                                        Malicious:false
                                                        Preview:......................>...................................E.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................O.l.e.P.r.e.s.0.0.0....................................................................................................+........S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........................(...................................................D.............D.o.c.u.m.e.n.t.S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........8...................................................@...........E.m.b.e.d.d.i.n.g. .3.5......................................................... ..............F.....)
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:40:21 2007, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Mon Oct 22 19:22:13 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):86528
                                                        Entropy (8bit):4.881958494433561
                                                        Encrypted:false
                                                        SSDEEP:768:Fl8E2XX+tjZyfSiy947UelYPLVEr+HClN61P:OyjZyWEUelyEr+MN6
                                                        MD5:E34AF91588EF52750B571461438523FC
                                                        SHA1:060DAAD994AD9CA194CF2745B197524AF01E4981
                                                        SHA-256:F05461F9C2DE1E0B19F4F2C4C44BCB9BFEF39586B18EB9D403497586DA5FE981
                                                        SHA-512:0971601CC34A99B221F284D5865323FD060E5F3DAF95EECCB2C0F434A6AC6FB12E77C5E4544BEE59BEFAEA704814979A94C0DC9BA5AEBF510A8F9E177CE44E54
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:40:21 2007, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Tue Oct 23 14:18:36 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):86528
                                                        Entropy (8bit):4.88633501894969
                                                        Encrypted:false
                                                        SSDEEP:768:al8E2XBaqD5vSiyV7UeikdtZ81+D9FCl9w:V5OUei51+D969
                                                        MD5:4C8430FEB6682068847DE23E43B28916
                                                        SHA1:BBC51A81B9A85354CD567DC39EF69579D4320DA7
                                                        SHA-256:C8BE4F958AA658009028FAAD99474AEE6E1834558AFC655BEE3F086E24EC394E
                                                        SHA-512:4547A4CD0869296621E0684AAF030133250DB8E4335BCDBFAB924CE389AAA826C477486176199688719CE7FBB00D628E079BD89033D7D1B32F0B94144ED03155
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Apr 28 17:00:15 2009, Create Time/Date: Tue Mar 18 18:34:07 2003, Last Saved Time/Date: Wed Apr 29 22:24:07 2009, Security: 0
                                                        Category:dropped
                                                        Size (bytes):90112
                                                        Entropy (8bit):4.881150690200426
                                                        Encrypted:false
                                                        SSDEEP:768:O4l8E2XlCGZJgtiSCg5Ut5Zl8MlHsDllxW:O5ZMUt5HHsD1
                                                        MD5:1A8B9BAB9A26DE6C4D078DE140FAEFAA
                                                        SHA1:108F6E387FFA826F7E52BCD4CC9A01B7428FB809
                                                        SHA-256:2FDEB8A9E37FB4B225AB55F317F06D00F280890466F03C0309EF76D577C29DE1
                                                        SHA-512:95A587D23889964C05FD9AB1C90F189947526697C0060386EE8CDDB26152E758E3F1C3167341CBE13815B5907017820AC20A1B97C799C162EA99BA3CEEBD7CEF
                                                        Malicious:false
                                                        Preview:......................>.......................................................~................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedd........ddddddde.dcddddtdA..dd..ddd.dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffd.fffffffgfgfgfffffffffgfffffefffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf...........................c....._..._....8....o..... ..hoooo}..................oooooo.s.....I..tssssQ.p......ppp~3........>...p{qppppqpc{sh...^AFCA,...]0........=...s.s.....K..tssssP.p......ppp.3........94>..p{pepppqpc{so...^AFCA,...]0........:7=..s.s.....A..tssssm.p..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 17:51:41 2007, Create Time/Date: Tue Mar 18 18:35:27 2003, Last Saved Time/Date: Mon Oct 22 19:25:35 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):97280
                                                        Entropy (8bit):4.977162636578716
                                                        Encrypted:false
                                                        SSDEEP:768:iR0jbfG0fYJfrpgAnVY7IfsUMXHwKY0/Oxlu7cimw:HbtfofTVxf/MXHwKY0/AuIi7
                                                        MD5:896F8A0D7E194A0685F0955C6FCD724D
                                                        SHA1:32AFD8CA6ADBFE20CB4D818F3C90FB4FD81BA04E
                                                        SHA-256:9AA224A1B697BCC8292EA5FFDC9BAF52F81287B157EA48A230F60024631A4614
                                                        SHA-512:BEC97B6CFF0656AC4F2AC8ABD20A4139C1B0E501AE69EF02840BD6DC9C0129D13BBBB19D2DCC19E41A342C18CC8726BE6BEB20A7BAB6391C95DA4310A0174026
                                                        Malicious:false
                                                        Preview:......................>.......................b...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.3.............................................................!.......................................................T.h.i.s.W.o.r.k.b.o.o.k................................................."......................................................._.V.B.A._.P.R.O.J.E.C.T.................................................................................................).......E.m.b.e.d.d.i.n.g. .2.2.....................................................%... ..............F.....P..
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Fri Jun 15 19:02:52 2007, Create Time/Date: Tue Mar 18 18:47:03 2003, Last Saved Time/Date: Fri May 16 18:49:41 2008, Security: 0
                                                        Category:dropped
                                                        Size (bytes):136704
                                                        Entropy (8bit):5.122314043578528
                                                        Encrypted:false
                                                        SSDEEP:1536:xv1oKLyI9q8o4zTcb2UlgcWK+xTrz7axPzUsdiallTonTIn2:xv1oY3z7
                                                        MD5:CEB12F669CCD7F4EECDA6E6526546E0F
                                                        SHA1:0DD99622131222D076229E0F8C407F74625E1CAE
                                                        SHA-256:9046CA568975FAD9DF681D3330D74EB9D0DA3649DD2D047E18578B91073B6F8A
                                                        SHA-512:DCB2B77ABE0973ABC483B9248754E57CBBDBF9BA989B62CA4C200851B26C09B6C894C593FC14375E6FFEF93FE5A77B822FBC57A89E054A0866B4BB52508A9217
                                                        Malicious:false
                                                        Preview:......................>...........................................................P...........................................................................................................................................................................................................................................................................................................................................................................................................................................S.h.e.e.t.2.4...................................................................................................................T.h.i.s.W.o.r.k.b.o.o.k........................................................................................................._.V.B.A._.P.R.O.J.E.C.T.............................................................................................U...........E.m.b.e.d.d.i.n.g. .3.1............................................."........... ..............F.......
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Title: Certification of Inactive Status, Author: James Lell, Template: Normal.dot, Last Saved By: msteffens, Revision Number: 3, Name of Creating Application: Microsoft Word 10.0, Total Editing Time: 01:00, Last Printed: Wed Oct 15 21:58:00 2008, Create Time/Date: Thu Oct 16 12:01:00 2008, Last Saved Time/Date: Thu Oct 16 12:02:00 2008, Number of Pages: 1, Number of Words: 178, Number of Characters: 1019, Security: 0
                                                        Category:dropped
                                                        Size (bytes):180224
                                                        Entropy (8bit):5.3712177177850355
                                                        Encrypted:false
                                                        SSDEEP:1536:+fpOF0kQmsMRT9CrDc0QrilK3dQKDj2MQCFju:8py0kQm9RT9CrFQXDj2gA
                                                        MD5:AA19D7736F3EF3BC68B25908B726999A
                                                        SHA1:3E2A28FA79CD93F0D47CD8E6FA9F09E8A2F12ED9
                                                        SHA-256:FB22AB8A19306CF0CBC659A6353A22880960907DD5182A83A713C94DA95DBFC9
                                                        SHA-512:D4510269FC2294B89C4AC530F2684F596953BDE1F5585576D2659ABE657BE436D08C2965343FB0A0713FEB09BF941FA203536E26E2805200124A835FC30C5242
                                                        Malicious:false
                                                        Preview:......................>.......................................................:................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....gdldd.dddddedddA..dd.fddddddde.dcddddtdA..dd.fddd<dddddddddddddddddddddddddddddddddddddddddd$dddddddddle.f.....cfkfffffffffffg.ffg.fffgfgfgfffffffffgfffffefffffffffgfffff.fffffgfgffff.7affffl7776777777_4afffffgf..........8....o..... ..hoooo}..."..............oooooo.s.....K..tssssQ.p......ppp~3........>...p{p.pppqpc{sn...^AECC^B,...]0........=...s.s.....O..tssssW.p......ppp` ...4..........p{p.pppqpc{sl...^AECC^B,...]#...7..........s.s.....K..tssssQ.p......ppp~$........>...p{p.p
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Title: Certification of Inactive Status, Author: James Lell, Template: Normal.dot, Last Saved By: msteffens, Revision Number: 3, Name of Creating Application: Microsoft Word 10.0, Total Editing Time: 01:00, Last Printed: Wed Oct 15 21:58:00 2008, Create Time/Date: Thu Oct 16 12:02:00 2008, Last Saved Time/Date: Thu Oct 16 12:03:00 2008, Number of Pages: 1, Number of Words: 42, Number of Characters: 241, Security: 0
                                                        Category:dropped
                                                        Size (bytes):463360
                                                        Entropy (8bit):4.580779504933828
                                                        Encrypted:false
                                                        SSDEEP:3072:Xx0kQm9RT0PhzfHiQ+z0kQm9RT0PhzfH7QKR50kQm9RT0PhzfHBQ:h4yRTAM4yRTAPr4yRTA
                                                        MD5:3E283F1FD6FE821EF531355E09CD8FAC
                                                        SHA1:DE14DF4F69EB7123F4CD2AFF72F093C6BBF7BDF5
                                                        SHA-256:77EA4BF10E6EB2AB9F8C4A752D67A65F268C6D9F4501DABCEABD1B0E8236A714
                                                        SHA-512:B256F3E0AC5282F399C7DDEC15E896FDEF25E73559A0630CC036EB3A849F9AEC22267776DA851E77B34950D0B6BAA0B273B72B63682D7D59EC24F88C853F2E1B
                                                        Malicious:false
                                                        Preview:......................>.......................7...........6...........................f...T...c.................................................................................................................................................................................................................................................................................................................................................................................................................................D.o.c.u.m.e.n.t.S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........8...............................................................E.m.b.e.d.d.i.n.g. .1.7........................................................................F......Nx./....Nx./................O.l.e.........................................................................................................................D.a.t.a.................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Title: Certification of Inactive Status, Author: James Lell, Template: Normal.dot, Last Saved By: msteffens, Revision Number: 3, Name of Creating Application: Microsoft Word 10.0, Total Editing Time: 01:00, Last Printed: Wed Oct 15 21:58:00 2008, Create Time/Date: Thu Oct 16 12:01:00 2008, Last Saved Time/Date: Thu Oct 16 12:02:00 2008, Number of Pages: 1, Number of Words: 178, Number of Characters: 1019, Security: 0
                                                        Category:dropped
                                                        Size (bytes):646656
                                                        Entropy (8bit):4.870802515688482
                                                        Encrypted:false
                                                        SSDEEP:3072:9n0kQm9RT0PhzfHtQfl0kQm9RT0PhzfHFQ+l0kQm9RT0PhzfHyQuU5pD0kQm9RTC:J4yRTAc4yRTAD4yRTAyU5h4yRTwrdOi
                                                        MD5:0AF05A4650FDF343A9C13262E16F986E
                                                        SHA1:9D7EDAFFC85356249BCABCC8A25B556E8615B36E
                                                        SHA-256:C87F73A359565D04941EB305AF7C9FE5B4818F577CA1319F8B578B69F2E4A947
                                                        SHA-512:C8FC8A1C1E3EBEA9927D0ACCD8A0C27D6F60F4A13E642DF894CE7387097D76B1F557B184A18DB80EDC7D7E50EF47BBAC65D8B35ACC349F415B9707698ACA69D2
                                                        Malicious:false
                                                        Preview:......................>.......................................................a...............................%.................................................................................................................................................................................................................................................................................................................................................................................................................S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........................(.......!...........................................t.............D.o.c.u.m.e.n.t.S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n...........8...................................................l...........S.u.b.d.o.c.u.m.e.n.t. .7...................................................%..........................t./..@..t./..............C.o.n.t.e.n.t.s.........................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Oct 16 21:17:12 2007, Create Time/Date: Tue Mar 18 18:48:47 2003, Last Saved Time/Date: Mon Oct 22 19:28:02 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):162304
                                                        Entropy (8bit):4.830184722169816
                                                        Encrypted:false
                                                        SSDEEP:768:HIVX+tXppv5JZp8scM0UET/5r9//PSfdNI46B4yGUbV2fiWwhgVQwq+1o:HIVX+IJafdNH6B4yZbV2fiWwIq+1o
                                                        MD5:B1056B83A838C1A1050782D8DE2B86FA
                                                        SHA1:A813E6A224949231A9B9AB4E7B7F675125D25D47
                                                        SHA-256:19F4FDA329AF5201897E76EB13A18FF469BB6C1C90D63679182A0E631C943026
                                                        SHA-512:DD3A5E08193527DF583206CBAA51B2AE0BE6A428A5FF37FA6BC37BD08601BDB24238D5C615FAE54B47136D154E49B503D9A100034BAEE40125F43B2BDE68DAB9
                                                        Malicious:false
                                                        Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................0.........................SQL.....PdSMON.DLL....%Active Data (Field Definitions Only)....RD:\DEV\CR Code\Remote Filing App\Version 2004\CF_Remote\reports\2002\cro-4100.ttx..........cro-4100.ttx.............................................................0.........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: programmer, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue May 29 15:40:58 2007, Create Time/Date: Tue Mar 25 14:35:37 2003, Last Saved Time/Date: Mon Oct 22 20:27:11 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):116224
                                                        Entropy (8bit):4.831635357966716
                                                        Encrypted:false
                                                        SSDEEP:768:FZMVR2jqTkOCsKswrOnHz9rm32Q3cpFHfuis3+nc:FVWTkOLKZraHzZmT3cpFHfur3+nc
                                                        MD5:5379BC15FFA3C25789C420B782932967
                                                        SHA1:E9C3245791ED044E567EA105AEBE066A3DD2DC66
                                                        SHA-256:01B3854F730104522577E3BF28277EA5808DAE318690B7DF3F2934C382C957DC
                                                        SHA-512:1E65192F90136EA88EFE3DD2F335FA5568538EA390DA7B1EAE50ACBCD4946590BD608AB4FF0D4A65BCBD2803AB6F3697CB966B09DA09433EF15E39017785696E
                                                        Malicious:false
                                                        Preview:......................>.......................v...............................y...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.e.p.o.r.t.I.n.f.o.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Author: State Board of Elections, Last Saved By: msteffens, Name of Creating Application: Microsoft Excel, Last Printed: Tue Oct 16 21:22:03 2007, Create Time/Date: Tue Mar 18 18:49:06 2003, Last Saved Time/Date: Mon Oct 22 20:31:02 2007, Security: 0
                                                        Category:dropped
                                                        Size (bytes):222577
                                                        Entropy (8bit):4.92535757129126
                                                        Encrypted:false
                                                        SSDEEP:3072:IfsIsefpkcEtHsDwC6Sag1Lo4cOfpkcUd3MDwC6SaXaoONv9tKAd0oNhzwcAS66p:kn
                                                        MD5:7770B0334CFBBE2CAF0B823D0D73024E
                                                        SHA1:38152A320F374F5115C0E4C4A249C4484D194CAB
                                                        SHA-256:F3CB0021FC58775DF1965E1AA682EDD8B228991ACBE3C7ECBBB50872CDAC5032
                                                        SHA-512:AF64DBBEE6A881D6C024CDC63B5C63A9DC7FC378B95D1FC3ECC61B421F9B3EDCE2715D5EA2F8C8290D96AACE5910561A12E7B6E8E2A6DE759989D3B97A999705
                                                        Malicious:false
                                                        Preview:......................>.......................................................T.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):4243456
                                                        Entropy (8bit):5.904631501447873
                                                        Encrypted:false
                                                        SSDEEP:98304:j24cB0pukTqkRXBpPw0l3mpkaL8vmN0sPVYaCKlOO5BRBwqyPQbgZ5WEVMRJT3VB:fcB0pukTqkRXBpPw0l3mpkaL8vmN0sPn
                                                        MD5:8963AF52B51008AA64C0DFC38978E561
                                                        SHA1:C76A9A66AFDB305791674B365B078B48343B7C98
                                                        SHA-256:F8D68F5A2685B78B8AD9B7FF3C1BD720AFC1F337EAE521AB8AAB6ACB5E5337BE
                                                        SHA-512:C2EF66D6AB3D075C706DCFC85B67DDDA7261A052B037B0E1854B64A9D58054503EB25214B62AFE565A9A7EDE8A981B280F4CCBCF253336000A7D42C3F6E19C06
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y....................................Rich............PE..L...a.ie..................@......... .........@...@...........................B.....{.@......................................{@.(.....A.~...................................................................(... .......d............................text....z@.......@................. ..`.data...`T....@.......@.............@....rsrc...~.....A.. ....@.............@..@..^............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):525
                                                        Entropy (8bit):5.0713464478909565
                                                        Encrypted:false
                                                        SSDEEP:12:MMHdt4N5SgVQ9TNRRgAhxAQkrEHUi95Jz:Jdt4XSgOTNRyADAQkrEHUiDt
                                                        MD5:E9CECB1E5CFDDF82CE102D096FC6DB92
                                                        SHA1:EEA233E02455050A95B7AD30FA42E077ED473293
                                                        SHA-256:499E0178C9C74ACC9DED7E9F66A99C2915C6ADEBF08D33907538180466D1535B
                                                        SHA-512:B61B1B718B9FF3F84174E3BA8CC2B6F1135659AADDA8C0FE1CFE3561F206A1746C48F16DD669C7E36AC960B0A4B1404739DADED074956A7454B738E37E1D6F47
                                                        Malicious:false
                                                        Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">...<assemblyIdentity version="1.0.0.0".processorArchitecture="X86".name="ExeName".type="win32"/>...<description>elevate execution level</description>...<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">....<security>.....<requestedPrivileges>......<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>.....</requestedPrivileges>....</security>...</trustInfo>..</assembly>
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:MS Windows HtmlHelp Data
                                                        Category:dropped
                                                        Size (bytes):302779
                                                        Entropy (8bit):7.927639628283951
                                                        Encrypted:false
                                                        SSDEEP:6144:SVRZVBdxgL1ART/Q+4Ghr6qUeaLAOw6cxf8JYxjv029IDuuj7Y79d/wq5fgSk:SVXVBzWAtQDGtnUxAfx0JEtGDR/Yj/dU
                                                        MD5:286D69BB312003FA01ECBCAF6587C7D5
                                                        SHA1:C611D2D743FC45A5BC419D0A255DB4A174100F77
                                                        SHA-256:F7EDE38A17EC24C0AFA54815DBEA222E17452C4A9A872B7FE462741B70199B6A
                                                        SHA-512:07A9D2C6F327873C4B2836FD6F434B1012C13CEE3816594C43430B0CA356814AAF0CAE4B490FEF8D89ED51112C3BF2FC240A2AA03B7183D135903B7E9B03F384
                                                        Malicious:false
                                                        Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T@.......@..............................ITSP....T...........................................j..].!......."..T...............PMGLV................/..../#BSSC...7../#IDXHDR....../#ITBITS..../#STRINGS..B..q./#SYSTEM..n.+./#TOPICS.....P./#URLSTR.....*./#URLTBL..P.H./#WINDOWS....L./$FIftiMain.....g./$OBJINST......./$WWAssociativeLinks/..../$WWAssociativeLinks/Property....../$WWKeywordLinks/..../$WWKeywordLinks/BTree..[..L./$WWKeywordLinks/Data...'.(./$WWKeywordLinks/Map...O.../$WWKeywordLinks/Property...i ./AccountTransferAdd.htm...B.~./AccountTransferDelete.htm...@.7./AccountTransferEdit.htm...m.+./AddingACandidateCommittee.htm..._.C,/AddingAElectioneeringCommunicationFiler.htm......'/AddingAIndependentExpenditureFiler.htm...".0%/AddingAIndependentExpenditurePAC.htm...7..#/AddingAJointCandidateCommittee.htm.....`&/AddingAJudicialCandidateCommittee.htm...".w./AddingALegalExpenseFund.htm...U.D./AddingAPAC
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, Code page: 1252, Revision Number: 19, Total Editing Time: 04:03:46, Last Saved Time/Date: Wed Mar 18 14:37:02 2009, Create Time/Date: Wed Jan 4 17:35:48 2006, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Name of Creating Application: Crystal Reports
                                                        Category:dropped
                                                        Size (bytes):45568
                                                        Entropy (8bit):5.362863051604835
                                                        Encrypted:false
                                                        SSDEEP:384:dOOtOnXLo80Y31Q7yrelcg6BfJnuewBc18:dftOilH
                                                        MD5:F333AB5364641E71074B186AAB1753BD
                                                        SHA1:BD37BB9C3814C0B6CAFD478DD317C19FB35BB81F
                                                        SHA-256:ECEB4597F02DBAC4C570E53EEFAA40D45862058609DCFF34B4E612CB5CA8E165
                                                        SHA-512:8E0BF47C1FC1A55D0EC0D9BD435235EA3D8F66235DC075F5C32EDD46D9D03088A4743607C96F12D5C3E298F384CC14BB8D8094B912AC0B69F24A4A8872698C5A
                                                        Malicious:false
                                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...............................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Microsoft Access Database
                                                        Category:dropped
                                                        Size (bytes):4894720
                                                        Entropy (8bit):2.4562849415129704
                                                        Encrypted:false
                                                        SSDEEP:6144:aduPCcaI/tlAIZ8Jo3Vw3QWjz3dwDQW8SypfZ3L1vLMqeFjFJJomc5S:xCF4tlAIK7IEEhOmcY
                                                        MD5:FED4926EDE0F27BB72EFFFAC8FC55876
                                                        SHA1:1136FC24FD788D3912F01B415A7A9CFD1A1C2E61
                                                        SHA-256:EA2D8537CF76616D0EDA204F64E617A4989CC1AAF1C31B5F297400EFFADAB8E5
                                                        SHA-512:162FB0823FC97AF70CDCB6CC0E617C2906D3EEF52440C5A76E577745407C0628D444FF7570ED9107DB1D632B356DAF7C3CE1BC9D86DD884D493BED311193684E
                                                        Malicious:false
                                                        Preview:....Standard Jet DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.U.7g....(.)..`n:{6...MZ.C...3..y[..|*..|.........8..f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):4.697011427073727
                                                        Encrypted:false
                                                        SSDEEP:768:O2D7zfksOUes48TUcv89F3/RtZ1i/I4496Ix5:O2Dffks8F3/N1i/IrN5
                                                        MD5:6F1FABBAA954167A7EE0804799566C44
                                                        SHA1:5FEF159646BA7E9027791F7A884D1171D2D7F306
                                                        SHA-256:B366327146822DF33AE1ABF77EC056F5F93C51CF02AEAA538CDD693276E7CB8C
                                                        SHA-512:C2EAC10E3D10DBCAB8F4F62E3CEA4D2D55A75DB9BAAC68B476BF4C7F25E31830D34879E759569E81C6FE3D42DDF1218E9E050FC6E1962DCA1B9F844780D91C6E
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........f..........&......%.....$....Z'....Rich...................PE..L......C...........!.....p...P.......................................................3..............................0x.......r..(........"..................................................................`... .......4............................text....h.......p.................. ..`.data...............................@....rsrc....".......0..................@..@.reloc..............................@..B.$.>............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):61440
                                                        Entropy (8bit):5.145978013039395
                                                        Encrypted:false
                                                        SSDEEP:768:vuOmIzS+LDqxem3lIYd8f6Wt8JFyFqhH0:vuO5S+3qxemVY6WCFyK
                                                        MD5:E457039B3F64986B7EC9CEE4B5E54ED1
                                                        SHA1:6D102676A531F2E6735EFDC8709C2E8017850205
                                                        SHA-256:DE69AE859C578FA7D9DB1C675A650573CF2B81B4E4292CD0E1CFC49435CB1371
                                                        SHA-512:778329349FD3D97F3E6CCD4C3A4F3250DA76DE97435080E23363F905326B7ADF79B0C7F4899B5C393879875A3D8AC1245CD7E0218B44546758E7AA078F85730D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................N....................2......Rich...................PE..L......C...........!.........@......................................................................................@...........(...........................................................................`... .......\............................text.............................. ..`.data...4...........................@....rsrc............ ..................@..@.reloc..............................@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):622592
                                                        Entropy (8bit):6.077970194897055
                                                        Encrypted:false
                                                        SSDEEP:12288:H31fVUPM+u1u6RS/olZNeQ1d6JjH/bldq8CMKtBBxSftKaXnDsju:7UP3u17xJ1cHrqTxGt9Xg
                                                        MD5:48713A483F2C48ECE4AF4F098A13469F
                                                        SHA1:D8F6BEDF737C52DA16B560E96DCE45889162D50B
                                                        SHA-256:D6E26D47CC578B701FBB9491D8DC5B3CAB317FE92F447387905755AB8F2DC991
                                                        SHA-512:2F01361C7B3D5326B2BC9D86DA47F49E98380DFA967C33E4DBB446C02278F412EDE5D9088F431E2E3EF3960E7F6F858C94F53F576CE3C87C2356FA7919758849
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X..c...c...c..o...c.,.m...c...i...c...g...c..p...c...b.=.c...S...c...R...c.h.e...c.P.g...c.Rich..c.........PE..L...8Y.<...........!.........p......U...............................................................................@...........d....`..|....................p..L.......................................................P............................text...V........................... ..`.rdata........... ..................@..@.data...<"...0... ...0..............@....rsrc...|....`.......P..............@..@.reloc.......p... ...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):208896
                                                        Entropy (8bit):5.44595307121718
                                                        Encrypted:false
                                                        SSDEEP:6144:LrsfggETxTPkLjo5OzzJ6ZrkTkFkwyVbKBJZZOp//:Re/
                                                        MD5:C701584A3CE8290E70D71BD1B61A65D8
                                                        SHA1:E33B28B6A41117E04F45A6A99B7C201DBBECA243
                                                        SHA-256:696F40AF1C271E0D721F0F0E6223020051A5FCABF79C02E7BEA1193F55DAAA2D
                                                        SHA-512:C0041AE2311F56D4C6868C30C2A190C1575B16DE94D12DFBAB439F03A138FC987845253B64621D6C7ADD23D7DDFFE2028354C45DC88A8C649B15946CD3CF49B2
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........f..........&......%.....$....Z'....Rich...................PE..L.....M...........!.........P...............................................0.......c.............................. ...........(.......T.......................@...........................................`... ....................................text............................... ..`.data...............................@....rsrc...T........ ..................@..@.reloc........... ..................@..B...E............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):73184
                                                        Entropy (8bit):5.1031501057723725
                                                        Encrypted:false
                                                        SSDEEP:768:qBTk6x6X4jwg6QttykgHGj+7RgazewxdgQlLZ6f152H/smzMGbRmHYGQSupZWye0:q/XjcegHbjEve/4e
                                                        MD5:87A2ADF125BE51CDD5D8D3843E0F0B7E
                                                        SHA1:F86F98587DC8193E197979714574AC127FDFB250
                                                        SHA-256:6C6CFB4E9A8DC9A0E65630A6718A87D6E3F962D87F4836845D8023FBF87F640C
                                                        SHA-512:7C9B5B1D3883D540E1A7A6CAB7C36509C59EC4766F91B79632B842269CE2349104F40B5E1D508A7D0AA713D8BD8C9F6797C82D2A73E0CFE0AABF1193E87D2ED8
                                                        Malicious:false
                                                        Preview:MSFT................Q...........L...............D...........0....... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...........h.......0...........\.......$...........P...........|.......D...........p.......8...........d.......,...........X....... ...........L...t................&.............. &...............%..............$ ............... ..............<&..............<(...6...........^...:..............H..............................h........................................................... !..D............................................................................................... !..................................................0............................................... !.....@...........................................H............................................... !.................................................h...................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.345293075550214
                                                        Encrypted:false
                                                        SSDEEP:768:vjBzwlSCIuAXEDsyPFHhOlLA57EkcAZnhtyFmNj:vLuAUocFHMlL07fRZPH
                                                        MD5:DC7A3BC0FC185CD68848DC6F7D7B026B
                                                        SHA1:C661CB1198F5E3927A67884E71CA95FF33026224
                                                        SHA-256:6618B3AB331642449F0B07E4F39ABF9FC3BB90AE90B298F1B9FFD58CA5397399
                                                        SHA-512:22C9B2B7930E9E442699E37F43944F7CB4CD2562ED8319B4341C59475FA8071B501F4908227378B7883930F14C3059F66531BF876B386DEA0027151B08006577
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.._>.._>.._>..."..^>......Z>......^>......^>..Rich_>..........PE..L.....3>...........!.....P...@...............`......................................_................................W.......S..(....p......................................................................X... ....................................text....H.......P.................. ..`.data........`.......`..............@....rsrc........p... ...p..............@..@.reloc..z...........................@..B'.};............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):5.118134691683147
                                                        Encrypted:false
                                                        SSDEEP:768:SbaGLiyxVx9+qtwWRnqZk0ca8lKLRT7vGUsbONP0B4s6r1BW:iLlx79+qtwWFqzrlT7vGUqONsFUO
                                                        MD5:81C8142EED021D18D4ACCEEA8D950068
                                                        SHA1:435173BAFE04157D0EC140B4F77E1C174A304911
                                                        SHA-256:C86E55610D35F87CBB29A89ECD0B838C2710BADE0E772977FCEA336FDCFF6451
                                                        SHA-512:4F169BC6011F8A23C6A71A6C6469EFB26A0ED24BBAA022FF153FC975E762C1FBBDB24D144E1A186ECF1792C353BB7B29E8970687DD333697CC19839B6B13E9D7
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......H.3O..]...]...]...S...].Q.V...].Q.W...].Q.Y...]...V...]...Y...]...]...].Z.N...]...\.V.].n.N...].S.V...]...[...]...Y...].Rich..].........................PE..L....`l:...........!.....`...`....../k.......p.....A................................{8.......................................y.......................................................................................p...............................text....^.......`.................. ..`.rdata..R....p... ...p..............@..@.data...............................@....rsrc............ ..................@..@.reloc..2...........................@..B.$.>H....$.>U....v1?_....$.>j.....G?w....$.>....UA.<.....$.>............KERNEL32.dll.NTDLL.DLL.USER32.dll.ADVAPI32.dll.ole32.dll.OLEAUT32.dll.MSVCP60.dll.MSVCRT.dll............................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):3.267042919287219
                                                        Encrypted:false
                                                        SSDEEP:384:KXcrE+FLvbmBhm1xgv/89aZ8EDQgeNQnKkG:KXc4+hvbehU2v/PZ8zQnKkG
                                                        MD5:BBBC65FDFBE05CF8D64602D96D1CC73C
                                                        SHA1:3AEDB477B3FCFE064998627DEC3F3E40F11C60D3
                                                        SHA-256:6A0255417D2197E016BBCA41E3C8849CDE951F30C2168225D550B19A7C3C5DBF
                                                        SHA-512:66526FBFC157984334C83C42B13DE2DD56C610DFA513637A5B4A9298B4F05AA4015C8532D640FD4A9524080D92B56A7D847575E0E48AB0513B1B66413F276FB1
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...ir..ir..ir...n..hr..ir..Nr...m..lr...R..kr...R..nr...t..hr...R..jr..Richir..................PE..L....Y.:...........!..... ...@.......).......0.....@.........................p.......6...............................3.......0..P....P.......................`..................................................D....0...............................text............ .................. ..`.rdata..^....0.......0..............@..@.data...,....@.......@..............@....rsrc........P.......P..............@..@.reloc..p....`.......`..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):49152
                                                        Entropy (8bit):5.717620044022021
                                                        Encrypted:false
                                                        SSDEEP:768:TuiZXiv6x2/PBTx30WGdoxJ3jiB9WQgK1JJ+Fo7YIi8E1u:Tupv6EZTx3CoxJRQDUoGE
                                                        MD5:EEACE14739B3E836F44D661C0042F223
                                                        SHA1:24F5967B7B12DA1ED343A73D723FE6FDFEA7F301
                                                        SHA-256:11DF90CC11DFEA9D9D7F2DA22CFFEF805CE658F6AB3E2150861EEBF03D690CA1
                                                        SHA-512:912FBB92B92A3A0BE65514FF13BEB6195A4631EFCDDE4231D48AA516DD59BAEC8D6FD125525B991A95D78B93EB0D6CE75C59D32A2463A83928ECEA8D1BDA5894
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........<...o...o...o9.o...o9.o...oR.o...o..o...o...o...o..o...o..o...o...o...o..o...oRich...o................PE..L....Y.:...........!.....`...p......y .......p.....@................................_g...............................|..[....v..<...............................................................................D....p...............................text...._.......`.................. ..`.rdata..[....p.......p..............@..@.data....<....... ..................@....rsrc...............................@..@.reloc..L...........................@..B.$.> ....$.>-....v1?7...........KERNEL32.dll.NTDLL.DLL.USER32.dll.......................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):49152
                                                        Entropy (8bit):4.429834468814966
                                                        Encrypted:false
                                                        SSDEEP:768:slkL9UsJCrigg6oh+D4w/yYTfRRCe0FR:saavE+j/yeffL0v
                                                        MD5:EB4C26E80D3B38124E657E309F266670
                                                        SHA1:B99894894AB502473975E72FD18EAFCE0E9D710C
                                                        SHA-256:E5C8A078A4820D2DD959BE32FD0DF50F82522F8DF1C8558DC90C5AF1EAB84409
                                                        SHA-512:D53B79D792DF4109DD0D45691F4B646109D72C84C0E6732A2431C112B47FA892124C37B4A6E7D1776189DD88CCAA683CA33A42BA246E0E73C1B18F35A667CD26
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y{N... ... ... ....... .R8)... ..9-... ..:$... .Rich.. .........PE..L....?`@...........!.....p...P.......................................................e...............................w.......q..(.......8...................................................................X... .......|............................text....h.......p.................. ..`.data...|...........................@....rsrc...8........ ..................@..@.reloc..h...........................@..B'.};............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1179648
                                                        Entropy (8bit):6.521473588938597
                                                        Encrypted:false
                                                        SSDEEP:24576:Xm2hiJswkzSpq5Z3jVecFRe+2x3sK6Ms203zviblO8kqO5NnibsBfhUy:X8kQsIOvfhUy
                                                        MD5:D2D3AB42E0FB3AFA8FF6AA9E965D9595
                                                        SHA1:34F244003EF1D43209823CDD946F801AE7A85466
                                                        SHA-256:5AC379FCFBDA3F8DB51CA02BE2C509BD057F17690359F09D4CBB292A67572D6A
                                                        SHA-512:80D468D7495C44988FB655E824575C0DA5ED38FD8A88141FDED106029057E66609CA2E1FF3BA55B0D429FFD737E401F32857A3C92EBCC2ADF97D0B8C49EFEC76
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......w..q3.r"3.r"3.r"n.y"0.r"..|"..r"n.x"..r"Q.a"?.r"3.s"5.r"3.r"5.r"..p"7.r"l.y"#.r"l.x"..r"..t"2.r".v"2.r"Rich3.r"........PE..L...R(i>...........!.........@......<......................................................................................$........P..`$.......................b...................................................................................text............................... ..`.rdata..............................@..@.data..............................@....rsrc...`$...P...0...`..............@..@.reloc..^o.......p..................@..B................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):307200
                                                        Entropy (8bit):6.383146474711384
                                                        Encrypted:false
                                                        SSDEEP:6144:mzdLJkXstL6iKvwzVLb34armOHi7+m463cG/CzQYQ8rk4TCmiSippnec:mxJkXWL6iKvwzVLb34armOHi7+oXzff6
                                                        MD5:FD64262820E74C63BB0D97061776C234
                                                        SHA1:28FC641E0154BCFDF383EDB9D28245F2873E4A12
                                                        SHA-256:2AE2BC42BC655010F11C2686EE4C318F07D6C1CF3EBC79A8E1FBDB57A49A2CC4
                                                        SHA-512:C26D4400EB99A425C886C1707D00A87018D4B0375FCFF39F127DC8CD26DA5114D73233868B99317C7415366D9B26D861DE321110F0F14E31623560A7F0F66826
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..l{.{?{.{?{.{?..w?z.{?{.{?z.{?..h?..{?..u?z.{?..q?..{?{.z?..{?..p?W.{?..}?z.{?...?}.{?Rich{.{?................PE..L... .t9...........!.....@...`......./.......P.....(....................................................................\......d....`.......................p...4...................................................P..4............................text....4.......@.................. ..`.rdata......P.......P..............@..@.data....V.......`..................@....rsrc........`.......`..............@..@.reloc..N8...p...@...p..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):2.0998953021911198
                                                        Encrypted:false
                                                        SSDEEP:96:rIzc50xqjhJtVyhbHxXoCcRXTTpQidqDJpAmJq+QGCGYmotqDMhoDp0LNf:rB5DXwVxXRc9TpQikDDAmJ5QcDMz
                                                        MD5:3DEE1017263C8973FB882989858A5C2F
                                                        SHA1:819B77196B265FE25E12BC26B8298C2B20DFF5A7
                                                        SHA-256:5D64F25968DD379EC2E4C463D0F181463AD7EF476B03D7BA4C730A08FCF8ACD8
                                                        SHA-512:4557B400B2D8E29B6F82D1F32F74A71E64FC21C45CD9B42BD8976C5BF4811A272FFDC703A7C213DF84EAE0C81239EEFD0EFACFC35392A51D47BF1F7FC49ECABE
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................j................................Rich..........................PE..L....Y.:...........!.........@............... .....@.........................`......................................."..F.... ..P....@..0....................P..................................................D.... ..d............................text...T........................... ..`.rdata..&.... ....... ..............@..@.data........0.......0..............@....rsrc...0....@.......@..............@..@.reloc..~....P.......P..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll..............................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):262144
                                                        Entropy (8bit):5.864729781432924
                                                        Encrypted:false
                                                        SSDEEP:3072:Nu9TYaMJzIOmFRfnCQuNtybMx8j0vZNSv:49fMJOFR+3ybMxE0hNSv
                                                        MD5:962A83A511ECDB73EA9AC8B00036B898
                                                        SHA1:5DA22EBDA48F16D2A77B778F4672CD94B924D198
                                                        SHA-256:CA7EFD83EF71B00F9203490309278A7EABFA019DA955DB35A5DF7DF203B91BE4
                                                        SHA-512:93547C27A4ECB1DB99C5AF0C48911D7F1D9246F72A9E395FD2EEFC25EFDA109B873E17DCD4A12542CFC5211F7BB25BEBB93135434BBF6A6F5892E9F4A71F943E
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Vy..7...7...7...+...7.......7.......7..n....7..Rich.7..........................PE..L...t.Nc...........!..... ..........h'.......0...................................................................... +.......#..(....@...f.......................D..........................................h... ....................................text............ .................. ..`.data...p....0.......0..............@....rsrc....f...@...p...@..............@..@.reloc...L.......P..................@..B..^............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):970752
                                                        Entropy (8bit):6.069974860037566
                                                        Encrypted:false
                                                        SSDEEP:6144:cOF/1nEiJcDvsRjMEunILaC1rdodjiSLYOxxe1AUVrTc:FrnEieDExDLaC5dQBLYOxxXUxc
                                                        MD5:F4C3228B8EFF49592EE2B8C303CD2E40
                                                        SHA1:A343B1278B73D8EE635A76872FE83928CC29CC5E
                                                        SHA-256:1CF1C86CCC0DC864EACDA1481C85CD8D75F2EFF58BAE04C4A1DE2ED1BA8BF133
                                                        SHA-512:89CC58E9039C13EB6CEA1E775ECB40E828DEEFDD3B94BE9CD15BFE21B4FC8428EE3FD6EA772976B76AD78551DFCEDF6D624E1A49D6C31A97CC310B5EF748B00E
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........#O..M...M...M.Z.C...M...D...M...@...M.&.I...M.Rich..M.........................PE..L.....]...........!..... ..........Ta.......0......................................t_..............................p'..........(....`...Z..................................................................h... ....................................text............ .................. ..`.data.... ...0.......0..............@....rsrc....Z...`...`...@..............@..@.reloc..B+.......0..................@..Bl.[J............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):66560
                                                        Entropy (8bit):5.764637632023211
                                                        Encrypted:false
                                                        SSDEEP:1536:5a/5Ni0La7Q4JpxsxrkVE55QbK/kglgp8P7M:k/580La7jJpqxrk4/LlgKPo
                                                        MD5:6AF7E771B815A4CEBCB57214B049CE52
                                                        SHA1:99935155D7C4E5693884F1E46955180437070296
                                                        SHA-256:F87575DB6FFCBE1C170A803EA3979D9885A4F13665BCE5DA44FEF5199A9C82B7
                                                        SHA-512:F7765C85F2A5517B2974F26B06794D154F75E8F66589045C6DEEFA99CFF65C6406630A45F057CA1A696AA65B40463E137338C2F1CB4AA047099C3B1B2D7D9F7D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l..............`..O.....L.....Rich...........PE..L....T.8...........!................`:............nB.................................M.................................._...p...P....`.......................p..........................................................4............................text.............................. ..`.rdata..?...........................@..@.data...........:..................@....rsrc........`......................@..@.reloc.......p......................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5206077
                                                        Entropy (8bit):6.315774370780597
                                                        Encrypted:false
                                                        SSDEEP:98304:LSZEWBxyRHvEK6Y/aZ8HhzAhCpmwks9XiyINsv:8zoRHvE8/i0wzwlssv
                                                        MD5:557903CB9179A5A8CFA6B852049E3884
                                                        SHA1:CDB5AEDA1D9E08E9A3AEE6CA58E0542571050680
                                                        SHA-256:F4E3E3B0699A3F80B7911C64AB17A74F8018B456DCA94A4F5F936B7A7F268466
                                                        SHA-512:77537EACF5D8204C998FA3731FB345C2439DE5672D5C256520BC731F8A8C4937E7F7D7E3A42BFD79E7E401375083F7E5706A24AB97B1D3E1FCEFD9F252AC39FF
                                                        Malicious:false
                                                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.............C...C...C..C...C..C...C..C...C...C...C..C...C...C...C...C...C...C...C...C...C..C...C..C...C...C3..Cl..C...Cl..C..C...C...C...C...CT..C...Cl..C...CRich...C........................PE..L.....g>...........!......4..@......cS1.......4...............................O......................................*=.....p.=.......?.......................K..w....4...............................................4.|............................text.....4.......4................. ..`.rdata........4.......4.............@..@.data........@=.. ...@=.............@..._CODE...P*....>..0...`>.............@....rsrc.........?.......>.............@..@.reloc..2.....K......pK.............@..B................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1224704
                                                        Entropy (8bit):6.559778036335788
                                                        Encrypted:false
                                                        SSDEEP:24576:wN1DzA5ePgWwS2zmQjyO2M/U1uW0PysgrG00mvwREQhi7VxT1ZOSw:yDz3PgYnQjXFKrk/EQujTXOSw
                                                        MD5:9AD69E823BBB916012E6188E4A3FCA98
                                                        SHA1:A21BC401A64B503639581DBC493660E00BCB3F64
                                                        SHA-256:1F54E088CE730AC08B7DF8C28DEBBC89F354713602ED9E7C260252167588E940
                                                        SHA-512:1E8D8F27DAE11ED4068B3E8F6EB1E842EEA38CF58964E0559E9B5020709891C67A5B40BD5A3A2C6A5A41CCFE1C70B2755B1C6A5284BA8ECB77251D8FEC112919
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S...2...2...2...:...2...>...2...:...2..H:...2...2..\2...>...3...>...2...>...2..'9...2...>...2..Rich.2..........PE..L....@B...........!.....0...................@.......................................................@..............p...|A......d....0.......................@...m......................................H............@..@............................text...j).......0.................. ..`.rdata......@.......@..............@..@.data....H.......0..................@....rsrc........0......................@..@.reloc......@....... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):102400
                                                        Entropy (8bit):5.455894620968054
                                                        Encrypted:false
                                                        SSDEEP:3072:FsIW2IQ7o+58dXtUaBFgl2LMxCq14vzVsjkwg3j+KsOpDdaX4GwXHnCTzAbgRunW:FsFQ7o+58TUaPgl2LMxCq14vzVsjkwgD
                                                        MD5:D3EB6533ABBC9ED6EBB4CE6357610C49
                                                        SHA1:F5FF9C94094B7521507F0A982BC85C417D7B0CB8
                                                        SHA-256:B50E896328C2C432FE8E1F03A55FEDE9DE4A83616B3A3256A2476945BE6C3F12
                                                        SHA-512:D17D4EA44645FE1F9B46F6770AAA6B6E22277702EF00D3C57C1A09F98EADCB72A5BFDC1078DA88C41042A5B9B90E2385DB63CC16B70DA74BD22911493D0246E7
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Mo.................F,....?(..........Rich...................PE..L..."r.V...........!.....0...P...............@.......................................................................0.......*..(....P..P....................p..<...........................................`... .......L............................text...+!.......0.................. ..`.data........@.......@..............@....rsrc...P....P... ...P..............@..@.reloc..`....p... ...p..............@..Bl.[J............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):415176
                                                        Entropy (8bit):5.974954032052747
                                                        Encrypted:false
                                                        SSDEEP:6144:dLIXG/SBt0iiVoY/pWEKDzPJxPPUIK1qDqNw:gG/vCY/M5hM8q6
                                                        MD5:821AB1F1CF9904CB9026C686F13F0F05
                                                        SHA1:398F64C00B026D1C6D94A6EFD180F20C010F5EE9
                                                        SHA-256:332E6A1CB4BF722092F9E774ECC14ACDDBF95A9655BEA021681B11AAC37AC716
                                                        SHA-512:D63C0FACD14ADFCA4E7E1E6D99D1FD1C2BE89C2C03E9835C506418A6A3FACB745888062BDF97CDAB0AD67CC8BCCB385AE10955F58150D9C4AC4A7C61E5C1E559
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6..6..6.....7..y..&..2..7.....7..Rich6..........................PE..L....D.9...........!.....`...........L.......p.....(.........................p......................................pn.......c..(.......Xg...........@....... ..|C..........................................h... .......X............................text...._.......`.................. ..`.data....7...p.......p..............@....rsrc...Xg.......p..................@..@.reloc..4L... ...P..................@..B.A.9............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.7494209933404663
                                                        Encrypted:false
                                                        SSDEEP:96:ejTU6VrXNd5zIrxKnlPJvBCaWNWpUi8par5VqxQDhoK/+YiyhotqG0hoN:ejTU6pP8rYTvCu8pcSQDxwyjG0
                                                        MD5:449045FAE688D76B18624FE566E32A54
                                                        SHA1:EA98B0853BA3A310362C43FA9F619238E7CAF947
                                                        SHA-256:5343CCFE98B12E0D9B064A9AC7291E17086C5853D40E8BC2AEFAADAA09113F67
                                                        SHA-512:7C366DA72221E9FB01D9927970B7539F89232CD77CD0C3C5C8ADEFF0203D68DD811AFFCA3E198941F28121B0ACEB212459EA8077CF7F5D65D5AC9D2F4BE647EA
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@..!...!...!..*=...!..V....!...>...!...!...!..V....!..n'...!..V....!..Rich.!..........................PE..L...7..9...........!.........@............... ....V@.........................`.......G..............................0"..U.... ..<....@.......................P..................................................0.... ..P............................text...v........................... ..`.rdata....... ....... ..............@..@.data...h....0.......0..............@....rsrc........@.......@..............@..@.reloc..&....P.......P..............@..B.$.>.....$.>%...........KERNEL32.dll.MSVCRT.dll.................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):126976
                                                        Entropy (8bit):5.428325754445499
                                                        Encrypted:false
                                                        SSDEEP:1536:WsF6hjb3IfW+SSzXFc+20WTCWADW0C90Qpi3UMDhHyj1oVU:7SjDcRSSzXFc+20GC9C90ki3vDUgU
                                                        MD5:AF80415CDC8AD1D8304FE8E1645743D2
                                                        SHA1:89F256E9280AF6159D89D0CC0289C7509C0AE735
                                                        SHA-256:AAB949FF5B13E7FFD8DD89D6DCAA491320DCBCFAD42B044D6988868304538DA1
                                                        SHA-512:41DF6C4F76373588873B230A9BA63D5DE0624D14F1CE970ED30B3E6C1FBE153A32A171BB520FC4DF042DDA011F23CEF648EFB9F916D01E30E81C09F11CEE3E1D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........AN. .. .. ..<... ...).. ...-.. .~.$.. .Rich. .................PE..L......`...........!.....`...................p.....................................................................0c......d\..(........@..................................................................`... ....................................text....S.......`.................. ..`.data...x....p.......p..............@....rsrc....@.......P..................@..@.reloc........... ..................@..B..^............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):245760
                                                        Entropy (8bit):6.5511171261787196
                                                        Encrypted:false
                                                        SSDEEP:3072:awe+BmVTUODP/IcpBxWeZlHEphpV9K8yKD4PtBeGiXdMj5Cn:tHBmdUODP/IcpBcCNEphLK5k
                                                        MD5:B4748AEEB6EDF8C05123B6542A2BE350
                                                        SHA1:F7165A96833C5ED0A30D15492499FC9DCFD998AF
                                                        SHA-256:527093225D1B40925B19A3100E305513AD94D1461ECA862B6D4D9642EA0B6885
                                                        SHA-512:380C9EE7DC5F32563BDBB0D66A25BD7249F91902299B6CECAA4DCBB04564FCA98B95132E9154CE6082A183A1116094120A7325754A9F5EFCB08866FB05C58303
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s..7...7...7...L...2......4..............C..........n..2...7...S......?.....6.....6...Rich7...........................PE..L....Y.:...........!.........`....................h@................................I...........................................<.......`$.......................8..............................................D.......d............................text...T~.......................... ..`.rdata..S........ ..................@..@.data...p...........................@....rsrc...`$.......0...P..............@..@.reloc...?.......@..................@..B.$.> ....$.>-....v1?7...........KERNEL32.dll.NTDLL.DLL.USER32.dll.......................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):3.485382050322971
                                                        Encrypted:false
                                                        SSDEEP:192:i9NOy89Skl9gzr3HUZTNzEOsrt/V8Rhfv67fSryIAuAhqLaPXGOS:i9NOGFH3HYTNzjsrt/V8vOSryShLaP/
                                                        MD5:BB46C0B126E28AED97D3DDFC96BE0902
                                                        SHA1:BAAA2A2CE2BA8563E4F6298A9EE2BF5D38D1AB2F
                                                        SHA-256:BB2469FC8087D0CF223E2344525A8FC536CF2CCEBC213F43F765FFAFEE44729E
                                                        SHA-512:747C578E3D44ACDF079693A8887EB898A6A213DD190AE98FECC348EAA371772F4BC98BE4C195F0C5A68BDB38EEB3D9F57B81189E46E284551B10F7F7664EA643
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k!../@../@../@...\...@..`b...@...f...@...`...@..Rich/@..................PE..L......B...........!.....0...0......l........@...............................p......&h..............................P8.......3..(....P..4....................`..............................................`... ....................................text....(.......0.................. ..`.data...H....@.......@..............@....rsrc...4....P.......P..............@..@.reloc.......`.......`..............@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):734504
                                                        Entropy (8bit):6.288077088983874
                                                        Encrypted:false
                                                        SSDEEP:12288:nLC3ZqLXl9ZZVvBMISsHHGg17SnXR2HKg/AggAVKBHFEWl:nLIZKXfVvGaGg1mnX8agDy2Wl
                                                        MD5:7AADDC7C334AE959674073439FA92FE3
                                                        SHA1:ABFD7C6ACCE89009D85C619E91010C307E2C06FA
                                                        SHA-256:C0DB8920AC1E460EE34313829245D2F05F2D71617C69F6B568C5C921747E62F2
                                                        SHA-512:FB0BDC3B495C3541AA5DF5D50C020A377F7C024727C95953984B2DA184091AD0FDE9D2B03D7E5AA2D86C8F454EA484ED16741353123E23CC8D9A35624139A277
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O.u...&...&...&.2.&...&^2.&...&.1.&...&.1.&J..&...&...&.1.&...&51.&...&...&...&...&./.&.1.&...&...&...&.(.&...&"..&...&Rich...&................PE..L...'.G>...........!................Q..............`.........................P.......|..............................P.......$........`..pE..........@ ...........v.......................................................... ........................text............................... ..`.rdata..............................@..@.data............p..................@....rsrc...pE...`...P...0..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):5.320336268402508
                                                        Encrypted:false
                                                        SSDEEP:1536:MnYrP/rZDN5Cz6y9LUXlnsiUG3eJ/TdY9G:tXrZDazf0lsLY
                                                        MD5:FE8A13548CB544D484496B67D7D6589B
                                                        SHA1:933C66BA98D6090E14E04DB3264D674D4C14921D
                                                        SHA-256:B351DCFBFE03D00A688C488046830D1178A06E6CA86D581388250259098C0C11
                                                        SHA-512:73FEB19916CC5E25B591D5B197AA38E9DEABBCA71A559A5AEA47DB73E9461E720F0674D2A757026E2076B5A0E67F8460B42278084C614E7EA7918023EEDAC785
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........\.Y.=...=...=..Z!...=..&....=...=...=..."...=...!...=.......=.......=...;...=..&....=..Rich.=..........PE..L.....`;...........!.........P............................................................................................h...P.......................................................................................8............................text....x.......................... ..`.rdata..............................@..@.data...............................@....rsrc...............................@..@.reloc..d...........................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):143360
                                                        Entropy (8bit):5.181324418041009
                                                        Encrypted:false
                                                        SSDEEP:1536:0azJfbOWDflv3L92tgdvy3SGBQESCI1IzpISZ6Vz6wQ/WN5kNM:08pCWD5+GvsSvCI1IuSMpVQ4k
                                                        MD5:D11EE0F19F05D867D8A2D8B5AA4EA94C
                                                        SHA1:2300ED6EF1859D0ECACFB5B0D8020BB4098563F2
                                                        SHA-256:2558BB08A4AACE37A4FDB667766F0D93D368BD0100C429854CA40AC7DBECD3BE
                                                        SHA-512:6009BBCC8B25C9F4CDA822905051B7B6F037625E04559FD8E2CCE1CBA33579D8600A5A8921A9FA560F15CCB086292D89C6DC5B5D2C5045EC58AA4469886AC39D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k!../@../@../@...\...@..`b...@...f...@...`...@..Rich/@..................PE..L.....ET...........!.........P......0........................................0......lD..........................................(...........................................................................`... .......d............................text............................... ..`.data...X...........................@....rsrc............ ..................@..@.reloc..n........ ..................@..Bl.[J............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):675897
                                                        Entropy (8bit):6.33183612141127
                                                        Encrypted:false
                                                        SSDEEP:6144:szNfL5Tx1o6Ky/9vCgchDAhy6Q0KQ7a3spjQ91fsu6UyepsMtt2+cH9ofSNXczFw:sDR5y0hy6aOa3spjQ9lmMEoqxchYIo
                                                        MD5:CD98432FDB8E13C7C5A940C01D3CCE77
                                                        SHA1:B4C5C3979883252DDBD4534CBB09F2D80F82F3D3
                                                        SHA-256:86C6FFBC5463F3A3410BA18B192556BE39ACC1D99CEC94783A5A9A38610B3CC4
                                                        SHA-512:1AC21A31E613C6D3D0518B3A497364BBEFFB33439F21A8D83A62D25123F4EBCA3A8D3BEF371B09187027BD5D84BBB9DEF7942FDB6B1A51A91F7F426BF1009A54
                                                        Malicious:false
                                                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$........=Y.V\7.V\7.V\7.C<.U\7.-@;.T\7..C$.U\7.V\7.Q\7.9C<.U\7..@9.U\7.9C=.R\7.9C3.T\7./}<.U\7./}3.T\7.|<.Z\7.|=..\7.V\6.^7.4C$.E\7.P.=.T\7.P.<.y\7.Z1.W\7.|3.W\7.RichV\7.........................PE..L...e6.?...........!.........`...............................................`.......................................D......$6...................................T...........................................................5..@....................text...N........................... ..`.rdata...U.......`..................@..@.data........P.......P..............@..._CODE...p...........................@....rsrc...............................@..@.reloc..p...........................@..B................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):204800
                                                        Entropy (8bit):5.6625050399442545
                                                        Encrypted:false
                                                        SSDEEP:1536:WFBHOaDV8SWAqRfU4R1PEgItQQN6sVB0TfJaoEGzAfNuyxPAhX6ORnKNmvzcrGjn:WpVZ8F+xuJ3AF5mnKNawrGjn
                                                        MD5:79381368BC9D996F6F4722D85FEC175F
                                                        SHA1:C28C7738636FF10DE781A6C87137F48335EE9F1C
                                                        SHA-256:618FF68ED9141B5A17506B08EF1378B29E5A14D7ECBD98577236139A521D7C62
                                                        SHA-512:4F1B94F62E63968DFB83BA77047868851BF6F8F48FBC6CA5850AC8077FC7D4F00F733816EC04B3DCA4D9C3E9755B49C51AB7EABAECBF9F230EAFDFE7C2B2413A
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......i..-..-..-.....,..b..$..)..,....,..Rich-..........PE..L......M...........!.....p........... ....................................... ......................................`q.......k..(.......8L......................T0..........................................X... .......h............................text....b.......p.................. ..`.data...............................@....rsrc...8L.......P..................@..@.reloc..07.......@..................@..B...E............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):18944
                                                        Entropy (8bit):6.082251537771566
                                                        Encrypted:false
                                                        SSDEEP:192:Isp6yEkGeVt7mdxy6BhUDwDBEKhixWPGqLukwRWxlRYlRXwHV1UBoN4GI6slUx:Vp6yGeVABrKcb7hjYjXwHHU04GJso
                                                        MD5:0A0324A4282DF0F2C3129E5BD84077BC
                                                        SHA1:5A4FB357AD6A245F75213C5F5593AB8F57E613DF
                                                        SHA-256:11B4C417769C5C4729165C8CA0567F7D3B06D4B82998AB297D59ADBAD9F74D5F
                                                        SHA-512:6074AE20F520449B5F3842F866BB8455B16E488C6D81BFBF898844C821D35EFC036B4DEEB9600502A54287050FE392BDA533FEB112B8A593F30CE779D1045646
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-..2...........!...2.$...".......".......@....(%...................................................................h....p.......................................................................................................................text...?#.......$.................. ..`.bss....$....@...........................data........P.......(..............@....idata.......p.......>..............@....edata..h............@..............@..@.rsrc................B..............@....reloc.. ............F..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):294912
                                                        Entropy (8bit):6.112628297874781
                                                        Encrypted:false
                                                        SSDEEP:3072:I5BjEZYf0mpCQWkmQFkC7SmmNLT1uEfhuVQA6nBgvWKwnvOtzC/8gfPACQ1pH2pE:zYf0mpC3kdFkC7SLLsmA6ESubhD+TU
                                                        MD5:70B34D924E4DBA93BDB051C50B76A935
                                                        SHA1:F3E1B375A577585F89482A78ACBCD92D3CC37796
                                                        SHA-256:80E70DFB52DF7F6DEE86C1DC174799FAC4E189550ED9E0B07AEB26F29E072F40
                                                        SHA-512:124584D8857A604C6B4026C36150074AFB3760893E464A5B2323551BD1E385D763A7FF2E5F5ACAA265AEEB766C08F486673BC9C13ADB53F9EBC03C380AF5C7D5
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=..uy..&y..&y..&...&...&...&l..&...&v..&x..&{..&y..&x..&/..&s..&...&p..&y..&...&&..&_..&...&x..&...&x..&Richy..&................PE..L...y.R;...........!.................................................................................................3.......+..........p....................@..$9...................................................................................text............................... ..`.rdata..[...........................@..@.data....O...@...@...@..............@....rsrc...p...........................@..@.reloc...H...@...P...0..............@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):135168
                                                        Entropy (8bit):5.712557269847559
                                                        Encrypted:false
                                                        SSDEEP:1536:yOHs9nZRvH2PP034ynzO8i9smTlTrHi1w9rDQtztKZChBohB1DcXvvhdBJ1Q:1WPvH2P7yzOJ9zTrHi1w9nQBzKWXvz5
                                                        MD5:23D3B53421DB2010647BB2379292863E
                                                        SHA1:49220E4A10E20876CB896DB389345C7B6A9333CE
                                                        SHA-256:B8CBBA9370F4011891B8DAEF34438DC3E3EF2EE9297D3C207FFE3F5ED380A024
                                                        SHA-512:8DF554AB0509BFD7B755342E6C78DC4DB7CFAA9D5C42439052EAFECF8853D5753B8975E8B214B75A46DE2C4FF973F8C93F5C358C29158D707F2544FF3901148D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x@....................,.......P.......,.......T.......................................,.......Rich............................PE..L......<...........!.........p......................................................................................@.......`...x....................................................................................................................text...H........................... ..`.rdata..............................@..@.data............ ..................@....rsrc............ ..................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.3865196823068335
                                                        Encrypted:false
                                                        SSDEEP:96:pvhwqwhJhOjVYee/c5T3mqlh+RIQYcHYmotqYnhoajt5:AqwhJhOBYZ/Q6qT+aQbYnJjt
                                                        MD5:965D0761E6321DB219C4DA55DE285278
                                                        SHA1:D36E872C3D44FE152B1707A57D6165F09275C800
                                                        SHA-256:B61529675C236BE1824D6779C8ECE1363A9BA5470B6F171ACFFBF7009ECEC83F
                                                        SHA-512:5B321F47D03919C5B77853E8BFFF4BC4D5627FD40E069B693EA259048331BB62A14D9D457A1782E208D0692EEDAC34CB72EA118B6A158DAC7E3D74DDBE159841
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......y./.=.A.=.A.=.A...O.<.A.=.@.1.A._.R.>.A...K.:.A...G.<.A...E.>.A.Rich=.A.........................PE..L....Y.:...........!.........@............... .....@.........................`.......N..............................P!..Y...` ..<....@.......................P..................................................0.... ..0............................text...T........................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc........@.......@..............@..@.reloc.......P.......P..............@..B.v1?.....$.>#...........USER32.dll.MSVCRT.dll...........................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):73728
                                                        Entropy (8bit):5.0754106893091615
                                                        Encrypted:false
                                                        SSDEEP:768:L8YJkGS97VlcvFGHstC7jrJQR8fT+VoiAz+Gyzkza0+CH8BC+JoEJo:L8iWRy4cKfae3+NzkW0dcBFJxJ
                                                        MD5:68D168F9E83DFAB14AA6D907290E2E15
                                                        SHA1:5E3328C43E765C5C272014189ACF996C8ADA1652
                                                        SHA-256:9866348EE2B19557194C357C57D9766B0628E4F15126510FD5D405962D42A575
                                                        SHA-512:E439C92A317338A87B682839F3F313117FB4667E149586B0636E00833BF79EE9D5E3720B0F5D485D7B2A3BABCE3F38870B533CD24281185AC603BFF8372CB7F8
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Mo.................F,....?(..........Rich...................PE..L...7..C...........!.........P............................................... .................................................(...............................X...........................................`... ....................................text...Z........................... ..`.data...`...........................@....rsrc............ ..................@..@.reloc..>........ ..................@..B..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1608992
                                                        Entropy (8bit):6.641020171993679
                                                        Encrypted:false
                                                        SSDEEP:24576:9RuZ5AUvWT9hg3EXGxpkrBoSO6rmsj96CWWc9lyg6+nsq:m5eERkrKSjWCdcjCBq
                                                        MD5:B3E42EA6551FD32F4B95E004186CD87B
                                                        SHA1:66A6F070E7029526BCC0280E3D428BE4B6247139
                                                        SHA-256:EF558752377ECE9E6ABF2F8CB31F4AA90D93D2DA513B2F674B810FA3F3F63EF0
                                                        SHA-512:979E63CA3E6D659A63CA9523670DE5CBB4C3520AAEAAD55848082DC0D22D12ED2446361EF008F97CDF14F38326EBF5662C82E84BB92292352727EFEA03C0AFFF
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.................H..........4U.......`.....Q................................)................................p..P.... ...8...`...............6.. W..........................................................L*.......`..^....................text............0.................. ..`.itext.......@.......4.............. ..`.data...DV...`...X...L..............@....bss.....V...............................idata...8... ...:..................@....didata.^....`......................@....edata..P....p......................@..@.rdata..............................@..@.reloc..............................@..B.rsrc........`......................@..@.....................6..............@..@........................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1402144
                                                        Entropy (8bit):6.695361468175675
                                                        Encrypted:false
                                                        SSDEEP:24576:WPm3mUFHlLsBXTZGZQ2crKYAKRBaSTGkvwIAsJlpC1IMXVZ:WPm2goth0KR0STGkvZlg1IMXL
                                                        MD5:EAD95E71017BCC7D5A75B508C82997C7
                                                        SHA1:0FEA2F23EA969EC134684CFCB4F7DA279F2F7C15
                                                        SHA-256:BA4DBCF376957742C83E9D82322C46D68BBED301458D876F7A6D5A7333B8414D
                                                        SHA-512:B675C6269B730A50433653CB92C7339910B45DAE6CC826628B3546A88570E82B46E6437A59284CF6AAFB43AD51B80119AE37D4B93CB309CC3B4A008196C6D2A9
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.................~.........................Q....................................................................O....P..@=...`...Z.............. W..........................................................d[..\............................text....i.......j.................. ..`.itext...............n.............. ..`.data....O.......P..................@....bss....(T...............................idata..@=...P...>..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc..............................@..B.rsrc....Z...`...Z..................@..@....................................@..@........................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1357600
                                                        Entropy (8bit):6.676037472083791
                                                        Encrypted:false
                                                        SSDEEP:24576:BbQr0YK8Usasyc0ZP0rqqTKOdB4Ssab0IOb/Ng/r0GEj:13CaZzqrdSSfW/WTjEj
                                                        MD5:7084D611F4646FD3652B1ED603A1F4CD
                                                        SHA1:9CA06B546644D37A62F11F79B1463FEBD974EC74
                                                        SHA-256:DEA658AA6156AD4C54BDD4BDE1883CA088D38CDD0E220946F3CE44767FF42BAE
                                                        SHA-512:9D00AC1C77EFEABA6AD59E461C2E396B716D4B888DF8D0FC2CBB7D9D1572C3AF12B7DF4822E19CD73DDDCC346AC6C481B9D725A1E1B5994BCDF74EEC93E41981
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.....................x.....................Q................................[~..................................N.......\7.......Z...........`.. W... ......................................................,................................text............................... ..`.itext.............................. ..`.data....O.......P..................@....bss.....S...P.......8...................idata..\7.......8...8..............@....didata..............p..............@....edata..N............z..............@..@.rdata...............|..............@..@.reloc....... .......~..............@..B.rsrc....Z.......Z..................@..@.....................`..............@..@........................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1353504
                                                        Entropy (8bit):6.674591083664776
                                                        Encrypted:false
                                                        SSDEEP:24576:sff3GymQgwTKYZe9YNTUPTBAS5m0WrSu/CScsOE:EmjtTT6S5ro/CzsOE
                                                        MD5:F7FF3D6E5359DA5243D7889D3200E32B
                                                        SHA1:6B4B02BBE68B09DF0D0CD680ECB56DF6C7F4463C
                                                        SHA-256:69DD649F0D3A05149E048EE216F8F68D8B81AE32473EF511A144C99352FCA960
                                                        SHA-512:9B11E90E0C50826EE571C3B6AA7D039AAD4B18481619404D3E578A41585214943FFC8C2A551E2B883C7C4F3544635A1BF5DF178F94B654C63F11E7ABF494B69E
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.....................v.....................Q....................................................................R......."6.......Z...........P.. W... .........................................................\.......^....................text...H........................... ..`.itext.............................. ..`.data....O.......P..................@....bss....|S...P.......*...................idata.."6.......8...*..............@....didata.^............b..............@....edata..R............l..............@..@.rdata...............n..............@..@.reloc...... .......p..............@..B.rsrc....Z.......Z..................@..@.....................P..............@..@........................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {D529246B-78E5-4E65-A3A2-8E1040E91E59}, Number of Words: 0, Number of Pages: 200, Title: CF Remote, Subject: CF Remote, Keywords: Installer, MSI, Database, Author: NC SBoE, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                                        Category:dropped
                                                        Size (bytes):868352
                                                        Entropy (8bit):6.2772030756930395
                                                        Encrypted:false
                                                        SSDEEP:12288:gmLYSxeFmPBKXsbzlDSJjQ8guBoN2KA2wKc7wMz7:XLYSxHW5BqPA2fc7wMz7
                                                        MD5:C42393B9643339D7F19EC2C717562646
                                                        SHA1:2D6F6B8CE8DE076516095B9E35157055F530EF41
                                                        SHA-256:2C3F9688DD4A7D3AFB3A28DDFA9A3A584C94E9029887DE5B3EF50F1DBB3D334E
                                                        SHA-512:72BCBA2C66EBD01BDDF1490A65BB7E640D967B86AABE22C93E15C1EDF560C6C3E4A22D7601D2C085466E8E05F2129417DA2BBE21B4F342641741667BEF6E80E8
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):606266
                                                        Entropy (8bit):6.509399522017653
                                                        Encrypted:false
                                                        SSDEEP:6144:77mkzB4Do4JUqptRCwCzae0LYPpeBnVZ8w4toZAcLrJa/liSVHUPk:nmkzB+dtRRReCYRo38KLg/lIk
                                                        MD5:6017C5F8EA6382684DEF62597535B277
                                                        SHA1:1ED79B319B3B0E47BD3B08C194B4CFE1A06F12A8
                                                        SHA-256:F4BB9CF2E03832F23B407D4BDEF1D44D4DFD6A510F2FDC1A6BE263241914B55B
                                                        SHA-512:65A0E4505294C621C031F64051017C9BEE36EF4B5F793C39010A516E84443CD85DBF092A1B4D6526ABEFD499994739326E0B55B2480523DE7C8189B6DD3FF0F6
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):315
                                                        Entropy (8bit):5.309533689743856
                                                        Encrypted:false
                                                        SSDEEP:6:SzgSDBk2r5ezoYLpyX5w3eLpy9kfufrnTzAz7jM41wb8AkV:S0SDBk2teztpyXuEpyefWf8MXbS
                                                        MD5:FFA704ACE5B4327CF7D399A6E6965455
                                                        SHA1:A9670A1E26DE26C9561B9EDDD20790DE0A7D622C
                                                        SHA-256:EE6869A37DD178B0D4B5ECB2E0B2F5BC5F6CA7AA90524119D078F9E0ED7A54F6
                                                        SHA-512:33F00D6625FEA01EB28CC88459EA694E5283A302D50EC4D22B156263B6510027816980E8A1E19BC6D0989074AAFA61173FA83979749FF58FAD495C7E0B76FE66
                                                        Malicious:false
                                                        Preview:MYAH-PREDEF-COMPONENT..New Project..$..TRUE..TRUE..$..$..$..$..MYAH-PREDEF-COMPONENT..73649591..NEW PROJECT..0..$..C:\Program Files (x86)\\SBoE\Campaign Finance\CF Remote..TRUE..Campaign Finance..C:\PROGRA~3\mia3DCC.tmp\data\..MYAH64WOW..Win32..OVERRIDECACHE....NATIVE_ENGINE..FALSE..ANAPPLYINSTALLWASCALLED..TRUE..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5675007
                                                        Entropy (8bit):6.48705961905541
                                                        Encrypted:false
                                                        SSDEEP:98304:2hG63qsl7dEhYCHnWzXzLbVI9AB5dECNhc6ZzH2oYK13icjqsNTUjJG:2Jah2zXzL5IWB5JhnHfFIG
                                                        MD5:3B2D532673D1567116105D04C621CDBA
                                                        SHA1:F0892A2DCF772529C115C15E6B1A510B4DC214E1
                                                        SHA-256:FD6D2298B1B5DD14A9F02207FAA4D7D7DC5F5B399E71F2F4EC3680C2DBC6DF0E
                                                        SHA-512:15ABF21DCF9ABF346DDFB6B35F75C607B4E6CF4518B629C39ADCA5E4690955D70C46C5A842F73FE7373FA6A7F7860DB514D3815DD04D1280DAD7A7D1A315B672
                                                        Malicious:false
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\{D529246B-78E5-4E65-A3A2-8E1040E91E59}\cfrv_4_0_setup_ALL.exe, Author: Joe Security
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?..`.................z;..........e;.......;...@.......................... Y..................@............................?..Y... D.......................................................?.......................?......`?......................text.....:.......:................. ..`.itext.......;.......:............. ..`.data...(.....;......~;.............@....bss.....}....=......Z=..................idata...Y....?..Z...Z=.............@....didata......`?.......=.............@....tls.....A...p?.......=..................rdata........?.......=.............@..@.reloc...I....?.......=.............@..B.rsrc........ D.......=.............@..@.............pY......\W.............@..@........................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):159
                                                        Entropy (8bit):4.892774327669993
                                                        Encrypted:false
                                                        SSDEEP:3:PXZkRErG+fyM1K/RFofD6GeLpyXjF3A39q1Jj4I52toYLpyXjF3A3OmGw3mkAy:vWaH1MUmGeLpyX5w4t52toYLpyX5w+jq
                                                        MD5:21D22691174AA25728C4CD7F7D5A85CA
                                                        SHA1:994695A289A7861C4040B602AEA778EAFB440771
                                                        SHA-256:D25F005EEE9EF910E5E4BDF0CE76F6FFB904A004FC9A401ED75AD4078D6F5DF8
                                                        SHA-512:483CCF0669E6820E300F2FC785A413C46A2D5A340784237E0F8BFE3DC997D8C9DCC7E1369DF9D9A2BA99C740C271ACA9FC5549F52D35501DE21B184982AE0A8F
                                                        Malicious:false
                                                        Preview:.C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Campaign Finance\CF Remote.lnk|8|C:\Program Files (x86)\SBoE\Campaign Finance\CF Remote\CF_Remote.exe..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {D529246B-78E5-4E65-A3A2-8E1040E91E59}, Number of Words: 0, Number of Pages: 200, Title: CF Remote, Subject: CF Remote, Keywords: Installer, MSI, Database, Author: NC SBoE, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                                                        Category:dropped
                                                        Size (bytes):868352
                                                        Entropy (8bit):6.2772030756930395
                                                        Encrypted:false
                                                        SSDEEP:12288:gmLYSxeFmPBKXsbzlDSJjQ8guBoN2KA2wKc7wMz7:XLYSxHW5BqPA2fc7wMz7
                                                        MD5:C42393B9643339D7F19EC2C717562646
                                                        SHA1:2D6F6B8CE8DE076516095B9E35157055F530EF41
                                                        SHA-256:2C3F9688DD4A7D3AFB3A28DDFA9A3A584C94E9029887DE5B3EF50F1DBB3D334E
                                                        SHA-512:72BCBA2C66EBD01BDDF1490A65BB7E640D967B86AABE22C93E15C1EDF560C6C3E4A22D7601D2C085466E8E05F2129417DA2BBE21B4F342641741667BEF6E80E8
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):7513
                                                        Entropy (8bit):4.985112886613449
                                                        Encrypted:false
                                                        SSDEEP:192:nqm9BigrTDd/WdZRH3HyrvM0cusqyaKVCci2AoIhmgmidS02Y8eUZFIqD3+It0KK:qm9BigPDd/2PHijM0CqyaCCci2Ao+mgX
                                                        MD5:3DC48DDC37E2D4A5D2FB89D46B7D9CD8
                                                        SHA1:6AF19AAAC4181F7A2D1D32919885BD9EE8A93107
                                                        SHA-256:AB1681AFC18A4DB43F1CBB6B8A7CD354F35D0290FFB11F2C3E94326D90850F54
                                                        SHA-512:95398449F09F5BFA6A561C9C5E800056505629F1CCC3998480B934F96378C08A03E8171EC05A38B2F65D96B5F38BCE6F4144073BC5BAA8DC6E415D7E3D1F2BFE
                                                        Malicious:false
                                                        Preview:.AAE4ED6BA..FALSE..AAE68B5EB..FALSE..A2AFAD2D7..FALSE..A47890F43..FALSE..AABF0EABC..FALSE..A5303394E..FALSE..A36C4273F..FALSE..ABEFE417A..FALSE..A2AFAD2D7..FALSE..A1AAFDCA9..FALSE..A4D583000..FALSE..A47890F43..FALSE..A392822E1..FALSE..A9202CBED..FALSE..A2AFAD2D7..FALSE..A5B95B812..FALSE..A1983855A..FALSE..A392822E1..FALSE..A6C969A31..FALSE..A86FEDFFB..FALSE..A280378AD..FALSE..A895B52CC..FALSE..A96D781B4..FALSE..A303D489..FALSE..A36C4273F..FALSE..A4D583000..FALSE..A47890F43..FALSE..A9EDFEF92..FALSE..A33529D6E..FALSE..AD400EB86..FALSE..A9202CBED..FALSE..A2AFAD2D7..FALSE..A5B95B812..FALSE..A1983855A..FALSE..A392822E1..FALSE..A96D781B4..FALSE..A4D583000..FALSE..A47890F43..FALSE..A759968E7..FALSE..A705D4320..FALSE..A108A6B0C..FALSE..A9202CBED..FALSE..A747EDAC0..FALSE..A31A38C9B..FALSE..AF2139E01..FALSE..ABAD9EF7A..FALSE..ACA4B8A8B..FALSE..A832FC268..FALSE..A2D3E0D90..FALSE..ABED664EA..FALSE..AF7CFC206..FALSE..AD77E7C08..FALSE..ADAE69E8..FALSE..AE76BBEDE..FALSE..ACE1E931F..FALSE..A43981525
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:7-zip archive data, version 0.3
                                                        Category:dropped
                                                        Size (bytes):8694055
                                                        Entropy (8bit):6.569101251424524
                                                        Encrypted:false
                                                        SSDEEP:98304:6bCyTWyZzxtJNL05f9tAYnA3U9XHsHcCXq8vXKEUo/wRZlV:Ia8KEUo/wdV
                                                        MD5:FDC346FFDFDD1F15F1DBA95695960160
                                                        SHA1:4983376DAB7201E8AF1728D2F6FD9AEE0CCAD376
                                                        SHA-256:74924F08BD5817B532B441E57C5D9C7CB55AD001C410C038DE1F54427D1160E9
                                                        SHA-512:AE7F0A4EC374A78816B7DDF3B90BD358729BC6E0C153C08CA4AC17741F6E72C0A3E43B822DD3A55FA15C603314B78B4D7E43D8F131ED60143CFB9B7C65E0B66E
                                                        Malicious:false
                                                        Preview:7z..'.....%........{........fX....TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):91
                                                        Entropy (8bit):4.482202581850587
                                                        Encrypted:false
                                                        SSDEEP:3:LibnEUsuISYov+ZjYXIkjwrQ4UNA3fvn:+bnSuvYo2WJwrQ4US3
                                                        MD5:78D8E6169CFDB028A983F4DB3CAF4EF2
                                                        SHA1:E75A4F0D2B4A080C94FA698F216EEEDBC34025F8
                                                        SHA-256:8D1F063948F245FD9E7D7B65A76D1CA274AC40199A0DD4D75C01640BED392B24
                                                        SHA-512:4AE130200E4D2C926DBEAF7042D662FB52E67974B3E08702221BE8FCE607FF0AEA696D0A0B1372567E27AB6148E050EEEFFFB12C1393769F12BD2D0D56D37A14
                                                        Malicious:false
                                                        Preview:{152D390A-DD7B-4E57-B3A5-14CADE7E1207}..{D529246B-78E5-4E65-A3A2-8E1040E91E59}..CF Remote..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):606266
                                                        Entropy (8bit):6.509399522017653
                                                        Encrypted:false
                                                        SSDEEP:6144:77mkzB4Do4JUqptRCwCzae0LYPpeBnVZ8w4toZAcLrJa/liSVHUPk:nmkzB+dtRRReCYRo38KLg/lIk
                                                        MD5:6017C5F8EA6382684DEF62597535B277
                                                        SHA1:1ED79B319B3B0E47BD3B08C194B4CFE1A06F12A8
                                                        SHA-256:F4BB9CF2E03832F23B407D4BDEF1D44D4DFD6A510F2FDC1A6BE263241914B55B
                                                        SHA-512:65A0E4505294C621C031F64051017C9BEE36EF4B5F793C39010A516E84443CD85DBF092A1B4D6526ABEFD499994739326E0B55B2480523DE7C8189B6DD3FF0F6
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 1 14:44:33 2023, mtime=Fri Oct 25 16:18:11 2024, atime=Fri Dec 1 14:44:33 2023, length=4243456, window=hide
                                                        Category:dropped
                                                        Size (bytes):1200
                                                        Entropy (8bit):4.653793230861067
                                                        Encrypted:false
                                                        SSDEEP:24:8iCEudOEDKYE+KYYAyuAm4sLy4ACdIzoUU1lpVO3yfm:8i1udOaE+Zxy1m4z43dK9Olb
                                                        MD5:E69B9FE1577DAEAC5407F32293491E3F
                                                        SHA1:608ACFBCE4ADC8D3CB0AAAA0FAEAC9D825D1870C
                                                        SHA-256:21BF72784CADC173F0E7CF598B13E37E687AA1033F24BB9DD2971F2E9786B427
                                                        SHA-512:B51FDFA3149C274B6848C9E3B200E6E9AD2BB96BB8558CBA6F09D249B558AC8591BAF50918F1032F2FF096C2A55B55B49977CA1C76C9620AA7E80A9C1B700D20
                                                        Malicious:false
                                                        Preview:L..................F.... ......Gm$..S....'.....Gm$....@.....................C....P.O. .:i.....+00.../C:\.....................1.....YYC...PROGRA~2.........O.IYYC.....................V........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....N.1.....YYC...SBoE..:......YYC.YYC..............................S.B.o.E.....j.1.....YYC...CAMPAI~1..R......YYC.YYC..... ........................C.a.m.p.a.i.g.n. .F.i.n.a.n.c.e.....\.1.....YYF...CFREMO~1..D......YYC.YYF.....!.....................u...C.F. .R.e.m.o.t.e.....h.2...@..W.} .CF_REM~1.EXE..L......W.}YYF......I......................P.C.F._.R.e.m.o.t.e...e.x.e.......s...............-.......r............i.l.....C:\Program Files (x86)\SBoE\Campaign Finance\CF Remote\CF_Remote.exe..J.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.B.o.E.\.C.a.m.p.a.i.g.n. .F.i.n.a.n.c.e.\.C.F. .R.e.m.o.t.e.\.C.F._.R.e.m.o.t.e...e.x.e.........*................@Z|...K.J.........`.......X.......701188...........h
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):174080
                                                        Entropy (8bit):6.279217790646268
                                                        Encrypted:false
                                                        SSDEEP:3072:xyljBP/VZjAISqyTFjoZAO1h7BTF1rJa//diUTTBXJxO8hlIhb0:xeBnVZ8w4toZAcLrJa/liSVHU
                                                        MD5:31CAD6A3EDD1C32981AD6B565CBEAC94
                                                        SHA1:9338978C85A9423EE2A38CBA027F79192D684F1B
                                                        SHA-256:B8521ABDA09EC17DDAD36528C1BC50395DC8C5F7C11C026A5B3FF23110C54182
                                                        SHA-512:02E198B8EF192DE55DB35AE00A16A80B3309A9373A596C20D617B43DD7159A635BC303F371859E704375521A1242D02754807E2E9DFEF63FFD06993B24C17D3D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..P....................6...>..............._...........6...P...o.^.....o.j....................Rich............................PE..L....S.L...........!........................................................@.......................................@.......9..P...............................@.......................................................,............................text............................... ..`.rdata...@.......B..................@..@.data.......P...4...4..............@....sxdata..............h..............@....rsrc................j..............@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):161850
                                                        Entropy (8bit):4.662047306059787
                                                        Encrypted:false
                                                        SSDEEP:3072:VmLCDQ9xl64bNmso7f4vqp/Mp+WD7UB4/YQfl:s
                                                        MD5:6D2EA67B5892DC26D5ABD01608BC086A
                                                        SHA1:14BC24724509E44918252D155FA3E7152FE232F3
                                                        SHA-256:76AA59963903F0299CDA780A1DA7583227CB4C84F4EFF213A101841CE02C39C7
                                                        SHA-512:1842D801325A1FD6F479A42A98A1C5A49EE7707B682E45BC95AE23C0E073288E9C4889710F6D925B6E852540355CB66565E2B745CFA7C76F34BF26FDDAAD9D7E
                                                        Malicious:false
                                                        Preview:Please install the common controls update from Microsoft before attempting to install this product...Setup resource not found..Setup resource decompression failure..Setup database not found..Runtime error in install: ..bytes..KB..MB..Attempting to get value of undefined variable ..Attempting to set value of undefined variable ..Copying: ..Unable to copy installation data to local folders..Downloading Web Media: ..Unable to download installation data from the web..Extracting Web Media: ..Unable to extract installation data downloaded from the web..Please locate your original setup sources to continue operation..Original setup sources required to complete operation, sources not found..General setup failure..Runtime error in setup script:..% complete..bytes received..InstallAware Wizard..InstallAware is preparing the InstallAware Wizard which will install this application. Please wait...Retry Download?..Downloading of installation data from the web has failed. Would you like to try again?
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):252415
                                                        Entropy (8bit):5.5406407126482025
                                                        Encrypted:false
                                                        SSDEEP:3072:+XjjjjNOJUu/4UHSteLixAkrQitNfyvobIAGrnj6VywfGMCz8OlsAI:+XjjjjNOZfSSk3Qow0f2I
                                                        MD5:44F77F1BBD46DEC6862CE4FB1DC89234
                                                        SHA1:0DE617D1E836141E31CCE8BB248FF21CCA5620E3
                                                        SHA-256:EF6C4F89F829BE9B225AF46788BD5D1ACEA2D0B665FDA4FBED1960E66B8A155C
                                                        SHA-512:C99DE199196F5B901CD2F584D79F5EBF4E2ED0827E861725D154E28098B440A82B87FB560EC49CD8DECD9A509DB4F450403CCD032811E855DC635F8493D2ABB2
                                                        Malicious:false
                                                        Preview:.Comment..Comment..Code Folding Region..Code Folding Region..Comment..Set Variable..Set Variable..Set Variable..Set Variable..Create Folder..Set Access Control..Set Variable..Comment..Code Folding Region..Get System Settings..If..Write to Text File..MessageBox..Terminate Install..End..Get System Settings..If..Write to Text File..MessageBox..Terminate Install..End..Comment..If..If..If..If..Does File/Folder Exist..If..Write to Text File..MessageBox..Terminate Install..End..End..End..End..End..Code Folding Region..Comment..Code Folding Region..Comment..Code Folding Region..Comment..Set Variable..Set Variable..Comment..If..Set Variable..Set Variable..End..If..Write to Text File..Set Variable..Windows Installer..If..Set Variable..Set Variable..End..Comment..End..Write to Text File..Set Variable..Visual Basic VM..If..Set Variable..Set Variable..End..Comment..Comment..Code Folding Region..Comment..Code Folding Region..Comment..If..Comment..If..Terminate Install..End..Display Dialog..Comment
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {D529246B-78E5-4E65-A3A2-8E1040E91E59}, Number of Pages: 200, Title: CF Remote, Subject: CF Remote, Keywords: Installer, MSI, Database, Author: NC SBoE, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: Intel;1033, Number of Words: 8
                                                        Category:dropped
                                                        Size (bytes):868352
                                                        Entropy (8bit):6.2747798286558885
                                                        Encrypted:false
                                                        SSDEEP:12288:XvLiSxEFm3BKXsbzlDSJjQ8guBoN2KA2wKc7wMz7:/LiSxdW5BqPA2fc7wMz7
                                                        MD5:FE1833DD19D1DB9BB590BA771A5693CF
                                                        SHA1:F0E719A4DC2809677289DB6059B07F2678A6823E
                                                        SHA-256:10D18CB27F4A7DF11252213FC839D25E7FA59C997B8D02566D0538BC0E52F163
                                                        SHA-512:5A1C2CE4CA98BA47FA326AA660B827BC25CFF22D3CD9E0D9C8D960E797AC87FC9536599095670283037CE0A01C6DBB2A24C6E2F7911FF5335A174324BDDA1CC4
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):33309
                                                        Entropy (8bit):3.3772470427001995
                                                        Encrypted:false
                                                        SSDEEP:768:pJHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfTE:phXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dt
                                                        MD5:F1BA2D0A20CF4290FCDB45B3CF54840C
                                                        SHA1:EC808EBC2563D3D00866BDE0AFF4059C3C995C03
                                                        SHA-256:F27A9B4D468632780547E3FC26A59993B3108A18CB096852A302577BFA4C6F2F
                                                        SHA-512:C4073CE6F58447B858901389D52BD479C888370CD6328499B516B9C919A728C4099F00DFA19005AC65BC986A79FF2A9A0E4CAAE9BCC0A5E3A72747696B4BC126
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):4.773773154848379
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:7INIkU3lkimkU3MIkT
                                                        MD5:8101E0CC3186C05F85B2CD484D26AE9D
                                                        SHA1:B3CF33E0784E3A6F3B3FEB2B2501E0BDA5932EFA
                                                        SHA-256:A0E750466327E92E2DCC96D72A19A7738A65AB765262DF4801E6677528F14D6C
                                                        SHA-512:DF3692D29CDF0434806A0BCF034AFE6869B0BF5C0BE24F18637D373374C1E1803AC5B6D1F671CCD6E89B313E26F85657EA487A2EBAEAE0B99359A66F21DF910B
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):15242
                                                        Entropy (8bit):7.84777952977126
                                                        Encrypted:false
                                                        SSDEEP:384:50OxsRBdY8cwyJ+Ic+GJQrSAhn37QpYaGwrCR:5kbdY8To+G7kY3
                                                        MD5:66B51FD9D148F40B906CDF17F206475C
                                                        SHA1:2A1C8284B6919C9527DBC386DBD58DCC6D245675
                                                        SHA-256:DF3404C11235C94FAB877B0474F5FA4020DAD0109F4AE309FA046A0618599896
                                                        SHA-512:D9AC3B86ED42EF6F74D0B6A65220FA652338A545B9B9C46EA45155480929B38119E6A78867E26E46F998B133E37DE24BDAAE98BBE7EF9C6067B891775BC45C70
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.v;..TPF0.TfrmDesign.frmDesign.Left....Top.|.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.DoubleBuffered..Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...GlassFrame.Bottom./.OldCreateOrder..Position..poDesigned.Touch.ParentTabletOptions..Touch.TabletOptions..toPressAndHold.toPenTapFeedback.toPenBarrelFeedback.toFlicks.toFlickFallbackKeys..PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data../...TPngImage.PNG........IHDR.......;......T$L....sRGB.........gAMA......a.....pHYs..........o.d../.IDATx..gx...?....{..".n.m....Kh.$.Z ......B..C.!.@......Kl.eK.%Y.m...5........\...m.=.{...p...Yk.. .C6666...ZoM.../.#4.........Q4!A_..?o..........2.....).D$.Aq...WB..hM...i$.;q...l".... M6H.5Q....*....,..QN4..ep..5..A1.P.A_.p.<.g.f4W...>Y...&.....Q.#...../....
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):377
                                                        Entropy (8bit):4.815324246200539
                                                        Encrypted:false
                                                        SSDEEP:6:s82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:IINIkU3lkimkU3MIkT
                                                        MD5:F7956EFDD257F64C607FC35CE295D625
                                                        SHA1:6AB4DB64B18631E2CD9C8234E9C31B4238CF4FDD
                                                        SHA-256:F25B4D0DE61024212EA4E18135EE9A4D6F145A92AC32C73746CB2619A6E1EC8D
                                                        SHA-512:94243359CED16C96E7DBF886912E1A68A1896DF13384CFFB5617AD48E5ECFAEA5EF076EB6D8C6F8126314656281B49F09450C82ADA8764FF481DC10113197BD3
                                                        Malicious:false
                                                        Preview:.IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):48434
                                                        Entropy (8bit):7.966771896841437
                                                        Encrypted:false
                                                        SSDEEP:768:D+2E2XFXd2pbhliaeVSCqLgle/miee9GIqeK7+72g4krhh:D+R2XbaewCsX2eLc+72gbrhh
                                                        MD5:978E3FBC366DFAE2E799E0D7CA673E01
                                                        SHA1:C312BBF3FDFEC3E2E97DE481732E2FD9D0282F20
                                                        SHA-256:995C3C9E62AEE9C2C35488D6ECC656459E3D43F0E9CF0066DA736AF6E3F87F57
                                                        SHA-512:5E41808A2C0BD825AF6E7ACFA7DA8EB818E294BDCA6AB336AAF253260D1A8B06E994E313DE90AC8D1A620DAA0A386484F5A62E790F4BED1609D2194EF5537332
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.:..Picture.Data......TPngImage.PNG........IHDR.......:........]....sRGB.........gAMA......a.....pHYs..........o.d....IDATx.........d.....9.s8t."E.X..T....."z.k.+z..*.T.D@...4A.Io.r..:.M.I2.L... ....z...e....L.ik=...7>..1 :x!........^ppz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x.
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1600
                                                        Entropy (8bit):5.007774942158045
                                                        Encrypted:false
                                                        SSDEEP:24:UuikSi+nfi0Zi5ai/pZSruicvSi+pipUiOsIi/pEai/fi/pTvSgREii/p51i/p56:U56AGHbR1ZRMfkf3faWYxVh
                                                        MD5:75A2E981E48B4697263548CB79B523CD
                                                        SHA1:52A5958B06D0B064420E7B882AAD64ADA14906FE
                                                        SHA-256:D65470903C956152C8BC2788F0E9689C52E2FA44B0A193E0F686854383A7519B
                                                        SHA-512:23D92DFF49399745EDBFADE604B1ED54115A7ED7BDE513381B66C4B46222525419E4EE2320BA2F10B6F80EF185F41340CDB8A93B655BE080D19111D2F669D2DA
                                                        Malicious:false
                                                        Preview:IF (checkSuccess.Caption = COMPLETE) THEN textComplete.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN textReboot.Visible := True;..IF (checkSuccess.Caption = CANCEL) THEN textCancelled.Visible := True;..IF (checkSuccess.Caption = ERROR) THEN textError.Visible := True;..IF (checkRemove.Caption = TRUE) THEN textRemove.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN RebootNow.Visible := True;..IF (checkSuccess.Caption <> COMPLETE) THEN textComplete.Visible := False;..IF (checkSuccess.Caption <> REBOOT) THEN textReboot.Visible := False;..IF (checkSuccess.Caption <> CANCEL) THEN textCancelled.Visible := False;..IF (checkSuccess.Caption <> ERROR) THEN textError.Visible := False;..IF (checkRemove.Caption <> TRUE) THEN textRemove.Visible := False;..IF (checkRemove.Caption = TRUE) THEN textComplete.Visible := False;..IF (checkSuccess.Caption = CANCEL) THEN textRemove.Visible := False;..IF (checkSuccess.Caption <> REBOOT) THEN RebootNow.Visible :=
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:MS Windows icon resource - 2 icons, 32x32, 16 colors, 16x16, 16 colors
                                                        Category:dropped
                                                        Size (bytes):1078
                                                        Entropy (8bit):3.8897554644986423
                                                        Encrypted:false
                                                        SSDEEP:24:hEi/gV/XZhmF6VBY6+yat7liXoj1NQCSj/:pOW0Y6+3Y6E/
                                                        MD5:D22667C1806E0F83E9247F7AA9BD17A9
                                                        SHA1:24DFB34D17D06D32DDB7C269CD0975DC4EBB459B
                                                        SHA-256:00055DDFD7AA9E48E8ABA6593F4167E0F3CD5C0E0F2A14FEF6F10CFE68D1E318
                                                        SHA-512:CE6F94B6B58870D439EC4AD4CC6852BB0A031F6670749B6B470C7745FB33897B7059A778816D16D170D6A571F17054A11089D316D58C2ADDC820F6D9B83A78E8
                                                        Malicious:false
                                                        Preview:...... ..........&...........(.......(... ...@.................................................................................................................wx.......................wz.......x.....wwz.......w.....wwz.......wx.....wz.......wx...w.w..wp....wx...ww...wp.L..wx...ww..wwp.L..Gx...wz..wwp.L..Dx...w..w.wp.L..DH.ww...w.w......D.ww..ww......pD.wwx.wwp..x..........wx....w..............xwp..........p........wwwwwx.....p.........x.........DDDDDOx..........vfl.Ox..........wff.Ox...........vflOx...........wffOx............vfOx.........~..wfOx.........w...vOx.........w~..wOx.........DDDDDOx.........................wwwwwww............................?.....................................................................................................................(....... ......................................................................................................p.....wz...p.......w..p.p..w...wp..w....p......w........x............www.....Gf.....Nvg.....G.g.....DDG...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):1597
                                                        Entropy (8bit):7.871063017224323
                                                        Encrypted:false
                                                        SSDEEP:24:X93kpZjQLmEcxtIwWXPAGpKpkZcks41xdrqUaBdJbYfxpJgx7YWg/uLwdCnq:N3Yj8mEcxywiPrpKpNMdr07SxgSt
                                                        MD5:B7225A16DAF9DE1D514AEFE567FDF2F5
                                                        SHA1:D6A00C526C425FCD5EF49B0C87814F2CF476CB59
                                                        SHA-256:0E2DEFC9B470D3F9BD184D254493EFAD94EA0273C1FE17FC8FC651D47B01734E
                                                        SHA-512:31412603AE87F2B9C9DAD2D0BA64868105586D1778846DE5F1C14667C4292DE36FC193B54670BDF130019B0B42AB59EEF2C2D8672226BA755181FEA894BD9246
                                                        Malicious:false
                                                        Preview:.PNG........IHDR... ... .....szz.....IDATx.W.L.W...!..dl.'.@.10.a.....2.T'.....SD..-PK@t.....:53.... :#F.......|"...L....6 m)Lw........9...K.+.b...z.x........=...J.V....n3[.B..v[m..../....o0.L....Q...&...$~?%%?PG..S<..]...$.Z......O.3".k....m]..2S9..4,.k+.xf..k.F...V..4[Ec'K.2.2..PK.....H$..H.....kA...M..>.zs.....^.*..K"...j..:..Hu.T..Q.....N...y'.+9.dR.{..Xn....w.f...R.KQB.]z........6>..,.......q.%........;.,......U{.i....Z.....)._I..7..J.q..d)...CM....;...,R~.B.S...E...p[-O........].F...%..A.%....{.%.*...]Q..>.-..f..C..i.Q..+5.......A'~.....J...M.mtN..0..r.>.@K.....D...<...CI^#.-.P.}?R..M.-.7..GS...Z^9s..<6.....>......<..g.~.9....{]Ju..}`..Z(..ikw^.,)X..g...|G.LQ9A^...9pe....7d.......SE.Q..../nx.}_..F...$..I..K...o4.^ ..e.X.Q.H......&........Q..............\n....J......./...7.....E.9.....$...K..!...c.`.=.Jd.nq.n.W.Q...Q.#s.w._.d....u...Q].-U.N.J..&.O..=......a+.k.....%.$..(.....@`...lx.......tDC..=.{...^"...@.....\{;#.^...G.q./AA.
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):32515
                                                        Entropy (8bit):3.2392237095249325
                                                        Encrypted:false
                                                        SSDEEP:768:j2HXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfE:juXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5D1
                                                        MD5:9A87495839CA4357F293308C86139F03
                                                        SHA1:0529F4612D004BAA1FE8806F6EAD5E78B3E76E55
                                                        SHA-256:C623B82A8BE3EAD16900164C09AFEE00215DC1749A6DE8D4F381CF983A3F5CEB
                                                        SHA-512:75F64D527924764598066D157C406FD18A00FA59EAB8D418724EF7E87B8B718EF57595118284710A08B17D7C287723AAF5F06383F877ADF77EFF7F7573AD665E
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0..~..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):502
                                                        Entropy (8bit):4.896842553280578
                                                        Encrypted:false
                                                        SSDEEP:6:aHi6GKuMtrk86i6euMtrkeuN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+J:0IMtgfjMtgxINIkU3lkimkU3MIkT
                                                        MD5:D312F2FDC09193A04578D688A2CA292D
                                                        SHA1:54BD3AA4CC72E68FC613A4227CADA7AD702D795E
                                                        SHA-256:DB1C3A93A00A46C77F3E8D19C5DA4D42C54CE58C9EB71B586E512ABEE2D46967
                                                        SHA-512:A71514B0F31010F7BF23954BCE707A277CA765BC14DDED7D7870615528A7751E4B26E72BB826781BC4F57C2A7C75FCFB92C4BA781AAD58372CF6CECE39832D19
                                                        Malicious:false
                                                        Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1608992
                                                        Entropy (8bit):6.641020171993679
                                                        Encrypted:false
                                                        SSDEEP:24576:9RuZ5AUvWT9hg3EXGxpkrBoSO6rmsj96CWWc9lyg6+nsq:m5eERkrKSjWCdcjCBq
                                                        MD5:B3E42EA6551FD32F4B95E004186CD87B
                                                        SHA1:66A6F070E7029526BCC0280E3D428BE4B6247139
                                                        SHA-256:EF558752377ECE9E6ABF2F8CB31F4AA90D93D2DA513B2F674B810FA3F3F63EF0
                                                        SHA-512:979E63CA3E6D659A63CA9523670DE5CBB4C3520AAEAAD55848082DC0D22D12ED2446361EF008F97CDF14F38326EBF5662C82E84BB92292352727EFEA03C0AFFF
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.................H..........4U.......`.....Q................................)................................p..P.... ...8...`...............6.. W..........................................................L*.......`..^....................text............0.................. ..`.itext.......@.......4.............. ..`.data...DV...`...X...L..............@....bss.....V...............................idata...8... ...:..................@....didata.^....`......................@....edata..P....p......................@..@.rdata..............................@..@.reloc..............................@..B.rsrc........`......................@..@.....................6..............@..@........................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1402144
                                                        Entropy (8bit):6.695361468175675
                                                        Encrypted:false
                                                        SSDEEP:24576:WPm3mUFHlLsBXTZGZQ2crKYAKRBaSTGkvwIAsJlpC1IMXVZ:WPm2goth0KR0STGkvZlg1IMXL
                                                        MD5:EAD95E71017BCC7D5A75B508C82997C7
                                                        SHA1:0FEA2F23EA969EC134684CFCB4F7DA279F2F7C15
                                                        SHA-256:BA4DBCF376957742C83E9D82322C46D68BBED301458D876F7A6D5A7333B8414D
                                                        SHA-512:B675C6269B730A50433653CB92C7339910B45DAE6CC826628B3546A88570E82B46E6437A59284CF6AAFB43AD51B80119AE37D4B93CB309CC3B4A008196C6D2A9
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.................~.........................Q....................................................................O....P..@=...`...Z.............. W..........................................................d[..\............................text....i.......j.................. ..`.itext...............n.............. ..`.data....O.......P..................@....bss....(T...............................idata..@=...P...>..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc..............................@..B.rsrc....Z...`...Z..................@..@....................................@..@........................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1357600
                                                        Entropy (8bit):6.676037472083791
                                                        Encrypted:false
                                                        SSDEEP:24576:BbQr0YK8Usasyc0ZP0rqqTKOdB4Ssab0IOb/Ng/r0GEj:13CaZzqrdSSfW/WTjEj
                                                        MD5:7084D611F4646FD3652B1ED603A1F4CD
                                                        SHA1:9CA06B546644D37A62F11F79B1463FEBD974EC74
                                                        SHA-256:DEA658AA6156AD4C54BDD4BDE1883CA088D38CDD0E220946F3CE44767FF42BAE
                                                        SHA-512:9D00AC1C77EFEABA6AD59E461C2E396B716D4B888DF8D0FC2CBB7D9D1572C3AF12B7DF4822E19CD73DDDCC346AC6C481B9D725A1E1B5994BCDF74EEC93E41981
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.....................x.....................Q................................[~..................................N.......\7.......Z...........`.. W... ......................................................,................................text............................... ..`.itext.............................. ..`.data....O.......P..................@....bss.....S...P.......8...................idata..\7.......8...8..............@....didata..............p..............@....edata..N............z..............@..@.rdata...............|..............@..@.reloc....... .......~..............@..B.rsrc....Z.......Z..................@..@.....................`..............@..@........................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1353504
                                                        Entropy (8bit):6.674591083664776
                                                        Encrypted:false
                                                        SSDEEP:24576:sff3GymQgwTKYZe9YNTUPTBAS5m0WrSu/CScsOE:EmjtTT6S5ro/CzsOE
                                                        MD5:F7FF3D6E5359DA5243D7889D3200E32B
                                                        SHA1:6B4B02BBE68B09DF0D0CD680ECB56DF6C7F4463C
                                                        SHA-256:69DD649F0D3A05149E048EE216F8F68D8B81AE32473EF511A144C99352FCA960
                                                        SHA-512:9B11E90E0C50826EE571C3B6AA7D039AAD4B18481619404D3E578A41585214943FFC8C2A551E2B883C7C4F3544635A1BF5DF178F94B654C63F11E7ABF494B69E
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....;.b.....................v.....................Q....................................................................R......."6.......Z...........P.. W... .........................................................\.......^....................text...H........................... ..`.itext.............................. ..`.data....O.......P..................@....bss....|S...P.......*...................idata.."6.......8...*..............@....didata.^............b..............@....edata..R............l..............@..@.rdata...............n..............@..@.reloc...... .......p..............@..B.rsrc....Z.......Z..................@..@.....................P..............@..@........................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):160624
                                                        Entropy (8bit):1.9662006432706152
                                                        Encrypted:false
                                                        SSDEEP:192:tdMMfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4Cwtq69wWnUgK:tfI/kwAgK
                                                        MD5:B3C9C9EE0C9C2DCB15CF24D5DF20F4F3
                                                        SHA1:3B1660EB617CB2751D9CCC79B8C025BD5A7B153B
                                                        SHA-256:23D6D6041B3025A8B1817B5FC455067B534AD91DCB19A1D09509A3AE55065CED
                                                        SHA-512:93C5B855AF462D9772754CB46307F5890735F7476D8ECF0F9CF213BC3A32EB4E19E3C48842A68F9D1DD29EAF2A8A2EE4712E917AB05BC121C18BFA77E3250811
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.\s..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8.....................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):4.773773154848379
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:7INIkU3lkimkU3MIkT
                                                        MD5:8101E0CC3186C05F85B2CD484D26AE9D
                                                        SHA1:B3CF33E0784E3A6F3B3FEB2B2501E0BDA5932EFA
                                                        SHA-256:A0E750466327E92E2DCC96D72A19A7738A65AB765262DF4801E6677528F14D6C
                                                        SHA-512:DF3692D29CDF0434806A0BCF034AFE6869B0BF5C0BE24F18637D373374C1E1803AC5B6D1F671CCD6E89B313E26F85657EA487A2EBAEAE0B99359A66F21DF910B
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):748544
                                                        Entropy (8bit):6.286323674013261
                                                        Encrypted:false
                                                        SSDEEP:12288:e+hZ8e1+K41szV/m21kOR3kkkZkkIkwkpL88888F888nr8H8J28c9fsxkkKO:B8nK41u4
                                                        MD5:773A12BFB25161AD84023B21C241A919
                                                        SHA1:A88488A8BAC4E6615F8A606049D402387DC7076C
                                                        SHA-256:8A4664B28646291B1FA5C8E16B5709E59D48A3E6B297A2C696F2A65F88A78C35
                                                        SHA-512:4C7F3950A6ADD9BBF053AAEAA1E365ABF76CF04C87A89F26B4B112CF6A2412F8B2C0FBDFABB305C2FB14B986832122870C7554B7C9362C01CF7A047C5E85B03F
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....T.....................|....................@.......................... ..........................................E............`..............................................................................................................text...4........................... ..`.itext.............................. ..`.data....%.......&..................@....bss.....P...0...........................idata..............................@....didata.............................@....edata..E............0..............@..@.reloc...............2..............@..B.rsrc........`......................@..@............. .......l..............@..@................................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1016832
                                                        Entropy (8bit):5.979344965125846
                                                        Encrypted:false
                                                        SSDEEP:12288:2GBRhi9pc8mQQoBc8wwA21kOR3kkkZkkIkwkpL88888F888nr8H8J28c9fsxkkKO:Px+r
                                                        MD5:A5646553AE51847135D436820C1F21C1
                                                        SHA1:F8601BC366E964DBA7F57C71278F451E2A5E49DA
                                                        SHA-256:740F122FE9707BD4A90048C75B1EB79C86B1B7E852B866517721D2F91CF646C5
                                                        SHA-512:04E97E2120A4805DCABEE5F3E03AFB1DA3646803F86461DD826A44BB39B99DB3E2600A2F4C24A51450F976660B02DC97C0F7FC349A8E38B131C49E56BF5E1F35
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..d......T.........." ................ .........@..............................p....................................... ..................E.......p............0...z...............f..............................................................h....................text............................... ..`.data...............................@....bss.....................................idata..p........ ..................@....didata.h...........................@....edata..E...........................@..@.reloc...f.......h..................@..B.pdata...z...0...|...T..............@..@.rsrc...............................@..@.............p......................@..@................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):32639
                                                        Entropy (8bit):3.2633511856005843
                                                        Encrypted:false
                                                        SSDEEP:768:scHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfi:scXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dp
                                                        MD5:3B989C7730DF816A13A88B722A25B021
                                                        SHA1:882F64912D28ED7C1EE1D59333E934CC73E1C50A
                                                        SHA-256:9E7054257B4D608BC16547468B0E6D4AA06B0A0CF467CF76CD7ED169979E0B2C
                                                        SHA-512:36E42A53E3F4956DD87DCBF6E36B43E9210B8A5195684228CCF7C465ECB7105505EAFF01F705B8B4D48631E21C02B443AB871D84415A1597FC4B52B22D18689F
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.k...TPF0.TfrmDesign.frmDesign.Left....Top.{.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):744
                                                        Entropy (8bit):4.963019277603885
                                                        Encrypted:false
                                                        SSDEEP:12:qITMDIb6UIJTc6S6juINIkU3lkimkU3MIkT:qIMIb6UIJA6SsuINI53ldm53MIk
                                                        MD5:172D6845744A1EC7DC233E9335C5A47C
                                                        SHA1:F0E3CB9C55F0F0961EF496D3EBF532943FB155E1
                                                        SHA-256:7AEF8EF0D965D2AEDDDF2FBC2B99BA2A3E5E96517BCD38ADB1A3315456D16E6F
                                                        SHA-512:639D0D336EA949B877E12A0DB026FC3D085F3DD2B25A7C5CDCC8850CCD998FCA4364BB18D167454AEDB763793E9D251E08A1A3A06A46117FF0B5B2AE22E06643
                                                        Malicious:false
                                                        Preview:IF (checkWINST.Caption <> TRUE) THEN WINST.Visible := True;..IF (checkJS.Caption <> TRUE) THEN JS.Visible := True;..IF (checkDotNET.Caption <> TRUE) THEN dotNET.Visible := True;..IF (checkWINST.Caption = TRUE) THEN WINST.Visible := False;..IF (checkDotNET.Caption = TRUE) THEN dotNET.Visible := False;..IF (checkJS.Caption = TRUE) THEN JS.Visible := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):25280
                                                        Entropy (8bit):7.001411886189215
                                                        Encrypted:false
                                                        SSDEEP:384:UDxsRBdY8cwyJ+Ic+GJQrSAhn37QpYapNeLNek+vDFNe+sbG7:UibdY8To+G7kYU
                                                        MD5:BEE5A08C5D6026897685C17652F76383
                                                        SHA1:BB82039AF48C28009478FCF86F55AF4EAF37D3A5
                                                        SHA-256:9C7C515DDB9864737330B339F581B2A9562099686930D85793C807AA451429BC
                                                        SHA-512:D59086FD7176C31B8C3B1271C5D2D63CE9E68D499E2B47DA4B504E72DFB2B9B2D3B5D81EF704D455C69C642C77F990E42DA3A5B3F53DDEE11B27FA5311490E25
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0..b..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data../...TPngImage.PNG........IHDR.......;......T$L....sRGB.........gAMA......a.....pHYs..........o.d../.IDATx..gx...?....{..".n.m....Kh.$.Z ......B..C.!.@......Kl.eK.%Y.m...5........\...m.=.{...p...Yk.. .C6666...ZoM.../.#4.........Q4!A_..?o..........2.....).D$.Aq...WB..hM...i$.;q...l".... M6H.5Q....*....,..QN4..ep..5..A1.P.A_.p.<.g.f4W...>Y...&.....Q.#...../....nccs.....tOr.\.u9.O.11."Y..+.6x~#%.|[3..Ni.A.$......T#...dG.Q..=..G$.A!..!8.s.....v89Q"..E..fB..t.`&..D.8,....D,.8i...'....9:!M%0..J...}YN...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):666
                                                        Entropy (8bit):4.809149901341814
                                                        Encrypted:false
                                                        SSDEEP:6:a3jF2duukAiRcjjuukTDoRcjF2duukTDQTjjuukA6uN82du+wg4RBN82dukU3ekd:csIrqar1sIroarIINIkU3lkimkU3MIkT
                                                        MD5:03D007FB3FC47A2F8CA6EB2C13881052
                                                        SHA1:3212C3FB7FAA97630F849AD7EBA205D90EAC7EE3
                                                        SHA-256:692786FB6BF3363DFDD0CDA8013986F4F63FD9209DA6BD1299CC8CF06275DF89
                                                        SHA-512:A2193DFBB22D9F8EFB3CFFD8F2E4021A3213667F13F218EF1AA9B1DD2BF3044AF1E71CFB19497762A386B6CFB841C4C642C739A52471556ED7C3877907D6EA9E
                                                        Malicious:false
                                                        Preview:IF (TestRemove.Caption <> TRUE) THEN CaptionInstall.Visible := True;..IF (TestRemove.Caption = TRUE) THEN CaptionUninstall.Visible := True;..IF (TestRemove.Caption <> TRUE) THEN CaptionUninstall.Visible := False;..IF (TestRemove.Caption = TRUE) THEN CaptionInstall.Visible := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):24914
                                                        Entropy (8bit):6.9942673423298425
                                                        Encrypted:false
                                                        SSDEEP:384:XAxsRBdY8cwyJ+Ic+GJQrSAhn37QpYapNeLNek+vDFNe+WR+7:X3bdY8To+G7kY5m
                                                        MD5:6D70B06FDC393A0BDCE00687D3D3C799
                                                        SHA1:83B092EC82DDF8F54417A9925AD7B002FD23AEAE
                                                        SHA-256:3DED25DB2B92E4A3932BAA32AA1957C08A8748039552827F4C5D54A487F23D6E
                                                        SHA-512:1875BE4270EC41829908C3E3FD4663E3C5EFA94F3D161FE709DAE6E9A73FE6868BDD88F2F795875B3893554BD5F6C9CBE2A12A2776AE92DE7B0DE960ED33A416
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.>a..TPF0.TfrmDesign.frmDesign.Left....Top.w.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data../...TPngImage.PNG........IHDR.......;......T$L....sRGB.........gAMA......a.....pHYs..........o.d../.IDATx..gx...?....{..".n.m....Kh.$.Z ......B..C.!.@......Kl.eK.%Y.m...5........\...m.=.{...p...Yk.. .C6666...ZoM.../.#4.........Q4!A_..?o..........2.....).D$.Aq...WB..hM...i$.;q...l".... M6H.5Q....*....,..QN4..ep..5..A1.P.A_.p.<.g.f4W...>Y...&.....Q.#...../....nccs.....tOr.\.u9.O.11."Y..+.6x~#%.|[3..Ni.A.$......T#...dG.Q..=..G$.A!..!8.s.....v89Q"..E..fB..t.`&..D.8,....D,.8i...'....9:!M%0..J...}YN....
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):4.773773154848379
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:7INIkU3lkimkU3MIkT
                                                        MD5:8101E0CC3186C05F85B2CD484D26AE9D
                                                        SHA1:B3CF33E0784E3A6F3B3FEB2B2501E0BDA5932EFA
                                                        SHA-256:A0E750466327E92E2DCC96D72A19A7738A65AB765262DF4801E6677528F14D6C
                                                        SHA-512:DF3692D29CDF0434806A0BCF034AFE6869B0BF5C0BE24F18637D373374C1E1803AC5B6D1F671CCD6E89B313E26F85657EA487A2EBAEAE0B99359A66F21DF910B
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):32365
                                                        Entropy (8bit):3.210637703795355
                                                        Encrypted:false
                                                        SSDEEP:768:F2HXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfMR:FuXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dn
                                                        MD5:8DB37E945737A642476551E6EA537ED5
                                                        SHA1:2579ECFFD229F167398337358778E032AAAE3E3D
                                                        SHA-256:4221122F990055367BE3AF2CCD9A8A6A28E4E8A8889B74BD543C70E96FF63527
                                                        SHA-512:461CD4C6F01A82AC1C6D97968AF1B3CCD6E5D5D8C76C5CDD92822869335C379E8DD07A562DF787232D173588D9DCBC1E3071A5E5BE873D02DE6744BEE599AA92
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.Y~..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):502
                                                        Entropy (8bit):4.896842553280578
                                                        Encrypted:false
                                                        SSDEEP:6:aHi6GKuMtrk86i6euMtrkeuN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+J:0IMtgfjMtgxINIkU3lkimkU3MIkT
                                                        MD5:D312F2FDC09193A04578D688A2CA292D
                                                        SHA1:54BD3AA4CC72E68FC613A4227CADA7AD702D795E
                                                        SHA-256:DB1C3A93A00A46C77F3E8D19C5DA4D42C54CE58C9EB71B586E512ABEE2D46967
                                                        SHA-512:A71514B0F31010F7BF23954BCE707A277CA765BC14DDED7D7870615528A7751E4B26E72BB826781BC4F57C2A7C75FCFB92C4BA781AAD58372CF6CECE39832D19
                                                        Malicious:false
                                                        Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):32609
                                                        Entropy (8bit):3.2576929890359447
                                                        Encrypted:false
                                                        SSDEEP:768:ewVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfg:ewdXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5v
                                                        MD5:357DC1A87B637A95C2255C15ABDB9765
                                                        SHA1:B41DBE26DB3C8F489E32096535E7DF8AF5F7859C
                                                        SHA-256:005829185AC1A56337D40D515C7E8DA84B06A8E7B7487477DE521861248645D0
                                                        SHA-512:ABBBD816EDDE10AF7612ACCF8858434BD9C17443B92CD7E3966F44B2F624822EE123EAD2DA7F1EF686D76D13FE7C4923F1E3460E0681CB9C239462638D14F677
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.M...TPF0.TfrmDesign.frmDesign.Left....Top.z.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TLabel.Label5.Left.(.Top.H.Width.8.Height...Caption..&User Name:.FocusControl..Name...TLabel.Label6.Left.(.Top.x.Width.A.Height...Caption..&Organization:.FocusControl..Company...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a......................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):576
                                                        Entropy (8bit):4.8398488933566055
                                                        Encrypted:false
                                                        SSDEEP:12:+GYMtg+YMtgdmMtgpMtgxINIkU3lkimkU3MIkT:+ffFmB5INI53ldm53MIk
                                                        MD5:FF697C2FFA89894EC61F9ADF6839926E
                                                        SHA1:25CA863E1866D72D2AB76F76B15A7705F2C0CD12
                                                        SHA-256:C8FDC1180440954E7773ABFA450D153194FA675B8B2764F0300C00A73C989BAC
                                                        SHA-512:A67389FBA944DEA454F7D4559911F745ADE10A8B3B5ED57A6741546AA4EF77FC47017BC7711A586A19EDFA3825517D78BA46A841B0AB7291B6145EA9B0E63A76
                                                        Malicious:false
                                                        Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):33341
                                                        Entropy (8bit):3.3842477874818355
                                                        Encrypted:false
                                                        SSDEEP:768:JdHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfM4:JFXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dk
                                                        MD5:8616C794648FD69FAC8F0F88EDB22E4E
                                                        SHA1:DDDFECF6EA3719E9CEF5C406FD4D525AF7D74A61
                                                        SHA-256:7E5099588AC9EB46983021CFDFCDDDBEFEBFE4CBD8388A531EDAD35FC3DA842D
                                                        SHA-512:B1288B55785B0CA40F331AE92460F213A1C8D77037D5ABA6BBBD74882024ABDC8985E10899F4476CFF64D83F424957B11FD0B759B537E2216DB4E146B1CD09ED
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.)...TPF0.TfrmDesign.frmDesign.Left....Top.v.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1096
                                                        Entropy (8bit):4.80637071596533
                                                        Encrypted:false
                                                        SSDEEP:12:+GYMtg+YMtgPt0YMtgPrYMtgP0ZYMtgPpDYMtgPuYMtgdmMtgpMtg6tkMtg63Mtz:+ff7kkKSHFmBBApVeN5INI53ldm53MIk
                                                        MD5:E30F9BD0EB3C6A3372F67E0F8886E28C
                                                        SHA1:B390AAEDCE02E0A1A031506EE73C313221367BBF
                                                        SHA-256:905BBFEDE6E19926541295E4599A14169CDC21392388DAE0EE1974A5C827D608
                                                        SHA-512:CBDCA01D6A8E060307DA35E6F5F5F52D691F0245E285548454B391543680817783CB443046263BEF5BC3B7A774C503771403FC5B76069F02ADD8A72972CE67F8
                                                        Malicious:false
                                                        Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Serial1.Text <> ) THEN Next.Enabled := True;..IF (Serial2.Text <> ) THEN Next.Enabled := True;..IF (Serial3.Text <> ) THEN Next.Enabled := True;..IF (Serial4.Text <> ) THEN Next.Enabled := True;..IF (Serial5.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..IF (Serial1.Text = ) THEN Next.Enabled := False;..IF (Serial2.Text = ) THEN Next.Enabled := False;..IF (Serial3.Text = ) THEN Next.Enabled := False;..IF (Serial4.Text = ) THEN Next.Enabled := False;..IF (Serial5.Text = ) THEN Next.Enabled := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THE
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):33637
                                                        Entropy (8bit):3.431633511700928
                                                        Encrypted:false
                                                        SSDEEP:768:+YHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfQd:+YXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dp
                                                        MD5:0ED309FE577738BE9F9EC6E6D4630658
                                                        SHA1:3D22B4956C8DA2C4E91D99C590E165710915AEC3
                                                        SHA-256:D65D017C4E6F112F1959F6BBC50FDFF35348596BE68183A5570257A199EAC1A6
                                                        SHA-512:10E4E1D32E0A47196D18EAFA4FFF03C7F7D36F3AF37E1A0A3DCDE04ADEB3BBF2B3CE51A76D8236CE60AF63D813469BB20E28E997F10BB7986E39DF97B851BFC7
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.Q...TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TLabel.Label4.Left.(.Top.H.Width.I..Height.!.AutoSize..Caption..Please select a setup type..WordWrap....TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................)..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):4.773773154848379
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:7INIkU3lkimkU3MIkT
                                                        MD5:8101E0CC3186C05F85B2CD484D26AE9D
                                                        SHA1:B3CF33E0784E3A6F3B3FEB2B2501E0BDA5932EFA
                                                        SHA-256:A0E750466327E92E2DCC96D72A19A7738A65AB765262DF4801E6677528F14D6C
                                                        SHA-512:DF3692D29CDF0434806A0BCF034AFE6869B0BF5C0BE24F18637D373374C1E1803AC5B6D1F671CCD6E89B313E26F85657EA487A2EBAEAE0B99359A66F21DF910B
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):47304
                                                        Entropy (8bit):7.975218070187998
                                                        Encrypted:false
                                                        SSDEEP:768:O62E2XFXd2pbhliaeVSCqLgle/miee9GIqeK7+72g4krhEF:O6R2XbaewCsX2eLc+72gbrhi
                                                        MD5:0F83894104A961DF18AF122437921981
                                                        SHA1:035D3BCFF5061491EDDD2DD61E06824A6E40F0D2
                                                        SHA-256:745A0A9C58B0DE05C941D3CD2EE9C88CF56499EBB5B28CFAAA3108A8E65E86B8
                                                        SHA-512:82CF13239DF3AAED763DF7AC335C3F1431DF6AE4F24A6240398FAF9AFC10F71DD1504B97EA6383F0384D3C8FADB89AC7AACA62D1FE6897F6E257DF35D9F4210C
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top.~.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.:..Picture.Data......TPngImage.PNG........IHDR.......:........]....sRGB.........gAMA......a.....pHYs..........o.d....IDATx.........d.....9.s8t."E.X..T....."z.k.+z..*.T.D@...4A.Io.r..:.M.I2.L... ....z...e....L.ik=...7>..1 :x!........^ppz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):4.773773154848379
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:7INIkU3lkimkU3MIkT
                                                        MD5:8101E0CC3186C05F85B2CD484D26AE9D
                                                        SHA1:B3CF33E0784E3A6F3B3FEB2B2501E0BDA5932EFA
                                                        SHA-256:A0E750466327E92E2DCC96D72A19A7738A65AB765262DF4801E6677528F14D6C
                                                        SHA-512:DF3692D29CDF0434806A0BCF034AFE6869B0BF5C0BE24F18637D373374C1E1803AC5B6D1F671CCD6E89B313E26F85657EA487A2EBAEAE0B99359A66F21DF910B
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):33346
                                                        Entropy (8bit):3.385772495039534
                                                        Encrypted:false
                                                        SSDEEP:768:27HXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibftPV:27XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Di
                                                        MD5:79A6D4AC0D44492941DBF1BCF729FCE0
                                                        SHA1:B9A4351BA665D5F190FDCEAAC2F278214E402628
                                                        SHA-256:ED50635652C5E71DD4EE1FBEB5B64E312235D3215C519E2DA2966FF44C61745B
                                                        SHA-512:D0B8A675193F05FFB8A71624E67A0FB63BE6433C73798B675486F6D86181DDE52E1910E51A27E7A61932A0360E2236BE3493196497D9B7C198A8B8CE5F6C2808
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top.z.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):602
                                                        Entropy (8bit):4.858794405298382
                                                        Encrypted:false
                                                        SSDEEP:12:jOYMtgQeMtg1dsdrHEUxIsdrHExINIkU3lkimkU3MIkT:jXoe3GI1INI53ldm53MIk
                                                        MD5:5622CBE0342EA56DBEDDB3F036450AE9
                                                        SHA1:97D52E9CE2FE1BA92BA141BCC66D2ECC6EC93978
                                                        SHA-256:19878CE6F272ECDBE413786244A8476214F99445EBB85F307E92B07F2A4C8869
                                                        SHA-512:C1E7CB7493635D368FBB7DA741353C82CB389488E1D8C32CB769FADACE21BC27416E59D2A9525A8DAC1D69195679CE91120496E7A74BF44377E91D97267B231F
                                                        Malicious:false
                                                        Preview:IF (MenuGroup.Text <> ) THEN Next.Enabled := True;..IF (MenuGroup.Text = ) THEN Next.Enabled := False;..IF (ISNT.Caption = TRUE) THEN AllUsers.Enabled := True;..IF (ISNT.Caption <> TRUE) THEN AllUsers.Enabled := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):32653
                                                        Entropy (8bit):3.2660830298663956
                                                        Encrypted:false
                                                        SSDEEP:768:ytHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf+:yVXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DV
                                                        MD5:CB602028339D00C4DBB706C86DF9E389
                                                        SHA1:F75C115A08686D6A83A660240F54E5234F815688
                                                        SHA-256:19761B22486D4041528899F9CF8F689648BF17CF8D5418459C67E2F8A0C82CC3
                                                        SHA-512:1DD03D35D4E9DC4AC7EC1A1403072FD2D092BA8265F045C59B557B191C73839A0DF12223E76B357B37DDBB6BF4D1E8935B86E709B961F1679BC80E18D0CFDD43
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.y...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):372
                                                        Entropy (8bit):4.766720372869046
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82duka:7INIkU3lkimkU3MIka
                                                        MD5:94AD21CCA6267AE8B311FF711DFFAB58
                                                        SHA1:7D1B91BCD6695D60504A4C37524213CB1D72F113
                                                        SHA-256:E8853FE461B20AC2EBE5CABB577D2BFCB786D64B2AF63CC882119400A800BA7A
                                                        SHA-512:CB2DCC281C0D6F07B5448C1195BAD726AE789105CD4B22DC33DB923B900C3627B843E132D38EDBB69D5EC7BDFFE165FD8E6552DFCE677E136EE24ADF32174398
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):32712
                                                        Entropy (8bit):3.276188088838966
                                                        Encrypted:false
                                                        SSDEEP:768:TtHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf3:TVXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5D2
                                                        MD5:B34F26CDAA44F4052F6E5492DA03A6AF
                                                        SHA1:C72C7C891DBB2AD7387618B340974EF2E35F2CC0
                                                        SHA-256:A9DCE5F9493CAD5A2059F3485D37F3B104C3D2F620E707FF5CA01AB441BF2462
                                                        SHA-512:C23332865986AA058B7677BEF749C42C92F394E495382AF30D4FD761ABA824C634FE22F1F84D3DD2DB8F7BFCC738DB9F18EA20FCEA47F3DD571C79D93714CFF9
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):372
                                                        Entropy (8bit):4.766720372869046
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82duka:7INIkU3lkimkU3MIka
                                                        MD5:94AD21CCA6267AE8B311FF711DFFAB58
                                                        SHA1:7D1B91BCD6695D60504A4C37524213CB1D72F113
                                                        SHA-256:E8853FE461B20AC2EBE5CABB577D2BFCB786D64B2AF63CC882119400A800BA7A
                                                        SHA-512:CB2DCC281C0D6F07B5448C1195BAD726AE789105CD4B22DC33DB923B900C3627B843E132D38EDBB69D5EC7BDFFE165FD8E6552DFCE677E136EE24ADF32174398
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):33015
                                                        Entropy (8bit):3.3312339385168404
                                                        Encrypted:false
                                                        SSDEEP:768:dPHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfW:dvXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dj
                                                        MD5:11F85D2CF8875B6F3319A1A04E67D808
                                                        SHA1:C148A7AC0723FE6246B4DD8FBADF36BE90B74D8E
                                                        SHA-256:D4ECD2325508B27B31E2A9FD4A996FC449B06469C018E6FF107325D29700E119
                                                        SHA-512:9D9D08B218CE5634F810FC32CF35146C5183DD7CB51C11A265B3FFFBCAE17737E756BEB34EBBCA8A00B6CD4377C0A0D4E5576AAC923D609E9FA426C8FFB7DE43
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):516
                                                        Entropy (8bit):4.934215231943702
                                                        Encrypted:false
                                                        SSDEEP:6:a2P2J2du+P2pVw6P2/u+P2pVIRBN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgf:tI5V50INIkU3lkimkU3MIka
                                                        MD5:E9C9A11806C14939C22C7EA9FF05EB45
                                                        SHA1:8E82BDE4A7B9024195641649BF4ACF1DD5F92499
                                                        SHA-256:F98E5CEB427FD0F0FED3FCF1125856F580547972AF05ECA6D6BE0358F626ECCA
                                                        SHA-512:E8D605167D01C77964DC649676FD5C5ECEBEE11020951A3DA9D10C49368E46B0FFA761DF6DFF08508214A220B0CCFB539C154F2536ABA7ECD7B63DC2C1B50008
                                                        Malicious:false
                                                        Preview:IF (Scheduling.Caption <> TRUE) THEN SchedulingLink.Visible := False;..IF (Scheduling.Caption = TRUE) THEN SchedulingLink.Visible := True;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):33046
                                                        Entropy (8bit):3.336672790672221
                                                        Encrypted:false
                                                        SSDEEP:768:rPHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfu:rvXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5D9
                                                        MD5:673178885A74C5200D7171E1B4E183E3
                                                        SHA1:5818381EF74CC6B69ECDBCB97705869C059577C4
                                                        SHA-256:1BBC1EE74DFD9A03B95C25C9B011965A9EB7F5DE01C696992FF88E2DE052806D
                                                        SHA-512:983AB426C7F766D5656272A1044716D592DA49DEF880B17002AE46F39A9B6EB1C49190A15FAAB6A90934DE2572BB7E06AFC28E3D233E1BBDD6D62AF76C555A48
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):516
                                                        Entropy (8bit):4.934215231943702
                                                        Encrypted:false
                                                        SSDEEP:6:a2P2J2du+P2pVw6P2/u+P2pVIRBN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgf:tI5V50INIkU3lkimkU3MIka
                                                        MD5:E9C9A11806C14939C22C7EA9FF05EB45
                                                        SHA1:8E82BDE4A7B9024195641649BF4ACF1DD5F92499
                                                        SHA-256:F98E5CEB427FD0F0FED3FCF1125856F580547972AF05ECA6D6BE0358F626ECCA
                                                        SHA-512:E8D605167D01C77964DC649676FD5C5ECEBEE11020951A3DA9D10C49368E46B0FFA761DF6DFF08508214A220B0CCFB539C154F2536ABA7ECD7B63DC2C1B50008
                                                        Malicious:false
                                                        Preview:IF (Scheduling.Caption <> TRUE) THEN SchedulingLink.Visible := False;..IF (Scheduling.Caption = TRUE) THEN SchedulingLink.Visible := True;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):877
                                                        Entropy (8bit):5.549505671141563
                                                        Encrypted:false
                                                        SSDEEP:24:7a2XxbXGAwkMLcByKiIabA5SUws88Ya+PR4SoPRebZ9D9KHxWl:m2XxbXGAwkriIr4pkebZ9IHMl
                                                        MD5:624DE50A4A6C0437D980DEA773109FF8
                                                        SHA1:F249E26093386FFE926030F28FE2B0B4873625DA
                                                        SHA-256:C4ACFDD3B07FEFA0DB03CD681ECAA839BFB04EB777E526434599B5A41FF59BCB
                                                        SHA-512:63C82867571F41ADCDE0BF0E6DABABD86A7700D707E3BD302B7375BAFBE5495C8A58233521F5DFA1D39B1F428A07662738ED529EF8E5231869149453C011EB30
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.Y...TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.k.ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label2.Left...Top...Width....Height.!.AutoSize..Caption.cUpdating $TITLE$ is almost complete. You must restart your computer for the updates to take effect..WordWrap....TLabel.Label5.Left...Top.0.Width....Height...AutoSize..Caption.)Do you want to restart your computer now?.WordWrap....TButton.Next.Tag...Left....Top.E.Width.T.Height...Caption..Restart &Now.Default..TabOrder.....TButton.Back.Tag...Left.I..Top.E.Width.P.Height...Caption..Restart &Later.TabOrder.....
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):372
                                                        Entropy (8bit):4.766720372869046
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82duka:7INIkU3lkimkU3MIka
                                                        MD5:94AD21CCA6267AE8B311FF711DFFAB58
                                                        SHA1:7D1B91BCD6695D60504A4C37524213CB1D72F113
                                                        SHA-256:E8853FE461B20AC2EBE5CABB577D2BFCB786D64B2AF63CC882119400A800BA7A
                                                        SHA-512:CB2DCC281C0D6F07B5448C1195BAD726AE789105CD4B22DC33DB923B900C3627B843E132D38EDBB69D5EC7BDFFE165FD8E6552DFCE677E136EE24ADF32174398
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):36152
                                                        Entropy (8bit):3.715506555383873
                                                        Encrypted:false
                                                        SSDEEP:768:V/HXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfW:VfXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DZ
                                                        MD5:6CF506036ACDBE8554FEC0CAD8B54B0F
                                                        SHA1:5AAEF6089C2410141B02DEC3D33F69CF49FAA1B3
                                                        SHA-256:33BE77CEB619494276458E4E460FEF863493B4481620B5A67B3A1316D72C1732
                                                        SHA-512:0668694E92E75FD8224EC27C73855ACC5016ACE6636D441B517030AA14C37751933DF4427D2A2BF9BD9AFE51E55A1615797745D7D8308EA406B6F49DC1B37F03
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.$...TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):872
                                                        Entropy (8bit):4.899823733661456
                                                        Encrypted:false
                                                        SSDEEP:12:7VGYMtgnWMtgn6o1p6o2bMtgCyYo1yYo1vVmMtgxINIkU3lkimkU3MIka:7Vf+youoE4opoVVm5INI53ldm53MIt
                                                        MD5:6C44799F82A9E3C3F0033400312E777D
                                                        SHA1:484155839C215464D63745A5A144079E52614D57
                                                        SHA-256:BD611C8203E1BD9AA67F8D1F99D8F9C103E8B7384FA7BE037ACA92B077DBA74A
                                                        SHA-512:5C8D32592471A7A9C09479864C48FC80CBFF65F30F673CF01E03C502FD6B70F02C145FE1E6FB30D8EAF0FAA3A00C8AC11F21904921D5B66A822480567CF01D1E
                                                        Malicious:false
                                                        Preview:IF (UserName.Text <> ) THEN Next.Enabled := True;..IF (Password.Text = PasswordConfirm.Text) THEN Next.Enabled := True;..IF (Password.Text = ) THEN Exclamation.Visible := True;..IF (Password.Text = ) THEN ExclamationText.Visible := True;..IF (Password.Text <> PasswordConfirm.Text) THEN Next.Enabled := False;..IF (Password.Text <> ) THEN ExclamationText.Visible := false;..IF (Password.Text <> ) THEN Exclamation.Visible := false;..IF (UserName.Text = ) THEN Next.Enabled := False;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):160068
                                                        Entropy (8bit):1.934119010860282
                                                        Encrypted:false
                                                        SSDEEP:192:XAMMfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4Cump6KDhT5mI:XeI/STn9
                                                        MD5:F9ADFD6EC9732629EA7FCDB171B49987
                                                        SHA1:3092A623D0E27BC5E03DB9EC67997D0E6354E808
                                                        SHA-256:72ECEDF679889DFE4A64EDB63C9EEFE44E9DBA5DFC0251518B9C06CE0C97AFA0
                                                        SHA-512:6085EE32FBA8D9E12B26EE0459A7E16EBA3539913AD4272B9B5EF590EC9389F92E0908E1E091A9C0D0E6856C0A79A822701DE9B37512DC4560A91F2E41F05C60
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.0q..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8.....................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):372
                                                        Entropy (8bit):4.766720372869046
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82duka:7INIkU3lkimkU3MIka
                                                        MD5:94AD21CCA6267AE8B311FF711DFFAB58
                                                        SHA1:7D1B91BCD6695D60504A4C37524213CB1D72F113
                                                        SHA-256:E8853FE461B20AC2EBE5CABB577D2BFCB786D64B2AF63CC882119400A800BA7A
                                                        SHA-512:CB2DCC281C0D6F07B5448C1195BAD726AE789105CD4B22DC33DB923B900C3627B843E132D38EDBB69D5EC7BDFFE165FD8E6552DFCE677E136EE24ADF32174398
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):33902
                                                        Entropy (8bit):3.4840746856844267
                                                        Encrypted:false
                                                        SSDEEP:768:kHHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfajKk:knXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5D1
                                                        MD5:FB8DB7BC2352BC8B2189821161CEF379
                                                        SHA1:B6E94A9213291A2D289C62C4859492A1787D6699
                                                        SHA-256:189B671D789580967E60E4C8B3ADD804CD4BF16EE1845250260B828D8761E658
                                                        SHA-512:68DE9CE306C0938988F8CD51FF670A204573591FF8424CFF2C48585EAF7E5E1DE8A396623A2D45497083AF7FE4661AA377A2499A982292FDF21AA708A1CDB369
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.Z...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):974
                                                        Entropy (8bit):4.892952093471582
                                                        Encrypted:false
                                                        SSDEEP:24:o7wKA7wY7wHvWvXvK/vqvqA77wz7wqAPINI53l53dm53MI53k:o7Q7P7e+vaiD77A7MPWq/icqU
                                                        MD5:D77CCDD3A7937D2219195F35873311D1
                                                        SHA1:7327FFEBD4F904CE4E1351662D4F26FEE272B973
                                                        SHA-256:8089C47E824035E10F1CCF9478F72EA4D09FD946AA0AD71C9B8F7471922C3464
                                                        SHA-512:9DAEDE3C919827762F066D0F3A28AB0174DF6077240B92D49846B9A5B694E0C3DF33B72F7B8FFAB0C1B18315E849052E33BE04BB40927C7D533A669D52D4D5B8
                                                        Malicious:false
                                                        Preview:IF (Keep.Checked <> False) THEN Notify.Enabled := True;..IF (Keep.Checked <> False) THEN Download.Enabled := True;..IF (Keep.Checked <> False) THEN Install.Enabled := True;..IF (Keep.Checked = False) THEN Install.Enabled := False;..IF (Keep.Checked = False) THEN Download.Enabled := False;..IF (Keep.Checked = False) THEN Notify.Enabled := False;..IF (Keep.Checked = False) THEN Time.Enabled := False;..IF (Keep.Checked = False) THEN Date.Enabled := False;..IF (Keep.Checked <> False) THEN Time.Enabled := True;..IF (Keep.Checked <> False) THEN Date.Enabled := True;..IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN InstallAwareX.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN InstallAwareX.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):160143
                                                        Entropy (8bit):1.9385323471953442
                                                        Encrypted:false
                                                        SSDEEP:192:wbMMfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CBtLzg6T5mWC:wdI/gVK
                                                        MD5:35F172C45DA2C84338CD11889AE3F058
                                                        SHA1:57159FC6A38D63A1D776654A13F5EAE6B5A52808
                                                        SHA-256:77888A511656391F3864564314ECB416797E6D78FBCB4FC8E81F61CE371DD373
                                                        SHA-512:FF3A9A6952AEACBB94FFFD5759C4BAADBB6172052948874B78520FCB370A05B2F2840274CB9804F59D09172EEBF8EC6ABE0F3A69837FCF16207CD721A661F0F0
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.{q..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8.....................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):372
                                                        Entropy (8bit):4.766720372869046
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82duka:7INIkU3lkimkU3MIka
                                                        MD5:94AD21CCA6267AE8B311FF711DFFAB58
                                                        SHA1:7D1B91BCD6695D60504A4C37524213CB1D72F113
                                                        SHA-256:E8853FE461B20AC2EBE5CABB577D2BFCB786D64B2AF63CC882119400A800BA7A
                                                        SHA-512:CB2DCC281C0D6F07B5448C1195BAD726AE789105CD4B22DC33DB923B900C3627B843E132D38EDBB69D5EC7BDFFE165FD8E6552DFCE677E136EE24ADF32174398
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):47223
                                                        Entropy (8bit):7.975755688019769
                                                        Encrypted:false
                                                        SSDEEP:768:VG2E2XFXd2pbhliaeVSCqLgle/miee9GIqeK7+72g4krh/:VGR2XbaewCsX2eLc+72gbrh/
                                                        MD5:197A9BB509D5943B7A9F2ADE53FFB0C9
                                                        SHA1:56A00C20656B5C6146DBC5622DF9FC2456682CB9
                                                        SHA-256:514CA52E32550096CB51CADB1FF36CF6B2B03CF0A46E0FA8D37679F0FFE67945
                                                        SHA-512:B2C57E17F7BEAE3B53D41CCDE26EA05136746E028DE5AC2A06968A1674620E34C179FCA2A24053A35BE94D9DB8FA269F17CEAC4EFA9159E9F3BB1A3AB48EB18F
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0.c...TPF0.TfrmDesign.frmDesign.Left....Top.~.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.:..Picture.Data......TPngImage.PNG........IHDR.......:........]....sRGB.........gAMA......a.....pHYs..........o.d....IDATx.........d.....9.s8t."E.X..T....."z.k.+z..*.T.D@...4A.Io.r..:.M.I2.L... ....z...e....L.ik=...7>..1 :x!........^ppz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..Q.8....8=........G..t.P<..(........E...@...p:.(.pz..N....N."....x..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):4.773773154848379
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:7INIkU3lkimkU3MIkT
                                                        MD5:8101E0CC3186C05F85B2CD484D26AE9D
                                                        SHA1:B3CF33E0784E3A6F3B3FEB2B2501E0BDA5932EFA
                                                        SHA-256:A0E750466327E92E2DCC96D72A19A7738A65AB765262DF4801E6677528F14D6C
                                                        SHA-512:DF3692D29CDF0434806A0BCF034AFE6869B0BF5C0BE24F18637D373374C1E1803AC5B6D1F671CCD6E89B313E26F85657EA487A2EBAEAE0B99359A66F21DF910B
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:JPEG XL codestream
                                                        Category:dropped
                                                        Size (bytes):32251
                                                        Entropy (8bit):3.1896653509607855
                                                        Encrypted:false
                                                        SSDEEP:768:arHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfH:arXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DI
                                                        MD5:8AA68DEE4B3D18226980261469A560ED
                                                        SHA1:E359A76C34D1F906690054A871C85DFA3A1C88A4
                                                        SHA-256:D2267023E1F38FA5E44AFDF55B6DD485E25F2F1A8EC82C9E93EB8F137F0FBA2F
                                                        SHA-512:6FC30F309A79C6A5661E6673B94258B0C1A240ED9934CB3D6A65C76CAAEDA032001A8F4C79416C76D9F278A0ADDFF595D04B1D60A0924363CEBB97311659CF6C
                                                        Malicious:false
                                                        Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left....Top.z.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight...GlassFrame.Bottom./..TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):4.773773154848379
                                                        Encrypted:false
                                                        SSDEEP:6:aiN82du+wg4RBN82dukU3ekRBN+ukYRBN+u+wgAuN+ukU3ecuN82dukT:7INIkU3lkimkU3MIkT
                                                        MD5:8101E0CC3186C05F85B2CD484D26AE9D
                                                        SHA1:B3CF33E0784E3A6F3B3FEB2B2501E0BDA5932EFA
                                                        SHA-256:A0E750466327E92E2DCC96D72A19A7738A65AB765262DF4801E6677528F14D6C
                                                        SHA-512:DF3692D29CDF0434806A0BCF034AFE6869B0BF5C0BE24F18637D373374C1E1803AC5B6D1F671CCD6E89B313E26F85657EA487A2EBAEAE0B99359A66F21DF910B
                                                        Malicious:false
                                                        Preview:IF (Glass.Caption <> TRUE) THEN Separator.Visible := True;..IF (Glass.Caption <> TRUE) THEN InstallAware.Visible := True;..IF (Glass.Caption = TRUE) THEN Install.Visible := True;..IF (Glass.Caption = TRUE) THEN Separator.Visible := False;..IF (Glass.Caption = TRUE) THEN InstallAware.Visible := False;..IF (Glass.Caption <> TRUE) THEN Install.Visible := False;..
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):13062
                                                        Entropy (8bit):5.208534224205054
                                                        Encrypted:false
                                                        SSDEEP:192:UVdrqNZrGleRnHmxwvoMb1PXFW152/86++SFBGhjXf9pXAve5lI/fO5t+:KR5+HmxwNPXt/b++SFBG1UG5lI/fOz+
                                                        MD5:E7DFF7C4D8CFF699E524E4B77CCE8DD6
                                                        SHA1:92B6D71A429E4B6CDED024146D1C18CF1BA786D9
                                                        SHA-256:7ABCE82D7EA746678C6DA61923E79A9C5C3C96AE62ED6761A4A733797B1D16B4
                                                        SHA-512:F4DD1B2BAB971F9D26575A94E424172C2CF57645BF5EBE4EBAEB4BF2D78F8222181DCCA0756594DB3B2A84C07CF29188FDE24A9B495A2921EC5339C91DFFC766
                                                        Malicious:false
                                                        Preview:SourceDir..C:\PROGRA~3\mia3DCC.tmp\data\..$ex..MEDIAPACKAGEPATH..\PROGRA~3\mia3DCC.tmp\..$ex..AAE4ED6BA..FALSE..$ex..AAE68B5EB..FALSE..$ex..A2AFAD2D7..FALSE..$ex..A47890F43..FALSE..$ex..AABF0EABC..FALSE..$ex..A5303394E..FALSE..$ex..A36C4273F..FALSE..$ex..ABEFE417A..FALSE..$ex..A2AFAD2D7..FALSE..$ex..A1AAFDCA9..FALSE..$ex..A4D583000..FALSE..$ex..A47890F43..FALSE..$ex..A392822E1..FALSE..$ex..A9202CBED..FALSE..$ex..A2AFAD2D7..FALSE..$ex..A5B95B812..FALSE..$ex..A1983855A..FALSE..$ex..A392822E1..FALSE..$ex..A6C969A31..FALSE..$ex..A86FEDFFB..FALSE..$ex..A280378AD..FALSE..$ex..A895B52CC..FALSE..$ex..A96D781B4..FALSE..$ex..A303D489..FALSE..$ex..A36C4273F..FALSE..$ex..A4D583000..FALSE..$ex..A47890F43..FALSE..$ex..A9EDFEF92..FALSE..$ex..A33529D6E..FALSE..$ex..AD400EB86..FALSE..$ex..A9202CBED..FALSE..$ex..A2AFAD2D7..FALSE..$ex..A5B95B812..FALSE..$ex..A1983855A..FALSE..$ex..A392822E1..FALSE..$ex..A96D781B4..FALSE..$ex..A4D583000..FALSE..$ex..A47890F43..FALSE..$ex..A759968E7..FALSE..$ex..A705D4320.
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):5.118134691683147
                                                        Encrypted:false
                                                        SSDEEP:768:SbaGLiyxVx9+qtwWRnqZk0ca8lKLRT7vGUsbONP0B4s6r1BW:iLlx79+qtwWFqzrlT7vGUqONsFUO
                                                        MD5:81C8142EED021D18D4ACCEEA8D950068
                                                        SHA1:435173BAFE04157D0EC140B4F77E1C174A304911
                                                        SHA-256:C86E55610D35F87CBB29A89ECD0B838C2710BADE0E772977FCEA336FDCFF6451
                                                        SHA-512:4F169BC6011F8A23C6A71A6C6469EFB26A0ED24BBAA022FF153FC975E762C1FBBDB24D144E1A186ECF1792C353BB7B29E8970687DD333697CC19839B6B13E9D7
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......H.3O..]...]...]...S...].Q.V...].Q.W...].Q.Y...]...V...]...Y...]...]...].Z.N...]...\.V.].n.N...].S.V...]...[...]...Y...].Rich..].........................PE..L....`l:...........!.....`...`....../k.......p.....A................................{8.......................................y.......................................................................................p...............................text....^.......`.................. ..`.rdata..R....p... ...p..............@..@.data...............................@....rsrc............ ..................@..@.reloc..2...........................@..B.$.>H....$.>U....v1?_....$.>j.....G?w....$.>....UA.<.....$.>............KERNEL32.dll.NTDLL.DLL.USER32.dll.ADVAPI32.dll.ole32.dll.OLEAUT32.dll.MSVCP60.dll.MSVCRT.dll............................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.7494209933404663
                                                        Encrypted:false
                                                        SSDEEP:96:ejTU6VrXNd5zIrxKnlPJvBCaWNWpUi8par5VqxQDhoK/+YiyhotqG0hoN:ejTU6pP8rYTvCu8pcSQDxwyjG0
                                                        MD5:449045FAE688D76B18624FE566E32A54
                                                        SHA1:EA98B0853BA3A310362C43FA9F619238E7CAF947
                                                        SHA-256:5343CCFE98B12E0D9B064A9AC7291E17086C5853D40E8BC2AEFAADAA09113F67
                                                        SHA-512:7C366DA72221E9FB01D9927970B7539F89232CD77CD0C3C5C8ADEFF0203D68DD811AFFCA3E198941F28121B0ACEB212459EA8077CF7F5D65D5AC9D2F4BE647EA
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@..!...!...!..*=...!..V....!...>...!...!...!..V....!..n'...!..V....!..Rich.!..........................PE..L...7..9...........!.........@............... ....V@.........................`.......G..............................0"..U.... ..<....@.......................P..................................................0.... ..P............................text...v........................... ..`.rdata....... ....... ..............@..@.data...h....0.......0..............@....rsrc........@.......@..............@..@.reloc..&....P.......P..............@..B.$.>.....$.>%...........KERNEL32.dll.MSVCRT.dll.................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):192512
                                                        Entropy (8bit):5.9642286021294835
                                                        Encrypted:false
                                                        SSDEEP:3072:068MaRFejZOvjqOTN9cWLBuQVNysFsfEz1vUgfK/vsIzx4yEo9:3cpAW9uQVUpMJvKMaxB
                                                        MD5:D24020E137BD588D955ACEF0A8E389CF
                                                        SHA1:7836AAA05532145E85C770EFA6B06398E5DDEF7B
                                                        SHA-256:815F428668D75B9328ACA5199A601F1DADB949D50D29E510E73E260B76323852
                                                        SHA-512:EC91F81F66B365D7C4C291D066F64D74A964D3535AFBC72A29C0B6F0DB1B7B260565F26A3CFFB5D4E48C63342B637A65B127019F58982C43593DC81FFD569852
                                                        Malicious:false
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......'$.cE..cE..cE...Y..dE...Y..aE...Z..gE..=g..`E...Z..gE...Z..gE..Z..aE..e..bE..cE..`E..5Z..pE...Z..nE..cE...E..ef..@E..C..bE..e..bE..RichcE..........................PE..L....A>=...........!.................................................................................................@.......,.......p.. C...........................................................................................................text...%........................... ..`.rdata...J.......P..................@..@.data........P... ...P..............@....rsrc... C...p...P...p..............@..@.reloc...$.......0..................@..B................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):270336
                                                        Entropy (8bit):6.270731532321854
                                                        Encrypted:false
                                                        SSDEEP:6144:shwrCzCaYgTe2I3J1un3m6fdjR4vAkGh+:shwmPrI3u3pd9kAM
                                                        MD5:A14947F6BA9E75C5E5C2263157E886CE
                                                        SHA1:0E39F13BEC51D6CB2F1CFF3F35660B0A2E3C4F40
                                                        SHA-256:E43F008E7E57BACDD29E02570C4728B720BA2D11D9D269FCFCA54C875715ABF8
                                                        SHA-512:B7CA2D08D9D5C9D1374CF541BFFF5AC87C2D5C82857AEF1B84BA6307A5157B192AABA62BE399B2B25AAE5176D39E198625A1CBB109B494AEDDC33B4783C73401
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:Km.[%>.[%>.[%>yD/>.[%>yD.>.[%>.G)>.[%>.y.>.[%>.G+>.[%>.y/>.[%>.y/>.[%>.D6>.[%>.D6>.[%>.[$>![%>.y.>.[%>V]#>.[%>n{!>.[%>Rich.[%>........PE..L.....{:...........!......... .......=.......................................0.......................................x.......m..x.......x........................,..............................................|....................................text...b........................... ..`.rdata...j.......p..................@..@.data....[.......P..................@....rsrc...x...........................@..@.reloc...=.......@..................@..B(.m=8......>E......=O....#.?Z...".m=d...'.m=q...........KERNEL32.dll.NTDLL.DLL.USER32.dll.ole32.dll.OLEAUT32.dll.GDI32.dll......................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):180275
                                                        Entropy (8bit):6.1633040175705185
                                                        Encrypted:false
                                                        SSDEEP:3072:nl3w8fl441BooG039ZYWI7ge5JC3t11WX3V0v4zSuoMZmbesm:nlrfZfAQ5efC911y3V0qZ2y
                                                        MD5:A636F5E7FF78759D5F3C677A2875FA2D
                                                        SHA1:DDCE4DC55DF00A4B6B92FBADDA6CF444B4D82F35
                                                        SHA-256:7C33447829876F22FA5D5FD5EF2E67AE06B48BB2BA32840CF44F940F2F547DF7
                                                        SHA-512:8C7A23B9B01075C0355E8889DE007D962E24E84EBA13B896FA8251EF2750D620CDCE74AD423003BFED70C39F7144803089B17C4D949DC9F71714BACC02668E15
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........lx..+..+..+...+...+...+...+p..+..+...+...+...+...+..+...+...+...+4..+..+...+..+Rich..+........................PE..L...M..;...........!.................B....... ...................................................................... ].......Q..x...................................0"............................................... ..0............................text............................... ..`.rdata...?... ...@... ..............@..@.data...08...`...0...`..............@....rsrc...............................@..@.reloc..l........ ..................@..B................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):245760
                                                        Entropy (8bit):6.5511171261787196
                                                        Encrypted:false
                                                        SSDEEP:3072:awe+BmVTUODP/IcpBxWeZlHEphpV9K8yKD4PtBeGiXdMj5Cn:tHBmdUODP/IcpBcCNEphLK5k
                                                        MD5:B4748AEEB6EDF8C05123B6542A2BE350
                                                        SHA1:F7165A96833C5ED0A30D15492499FC9DCFD998AF
                                                        SHA-256:527093225D1B40925B19A3100E305513AD94D1461ECA862B6D4D9642EA0B6885
                                                        SHA-512:380C9EE7DC5F32563BDBB0D66A25BD7249F91902299B6CECAA4DCBB04564FCA98B95132E9154CE6082A183A1116094120A7325754A9F5EFCB08866FB05C58303
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s..7...7...7...L...2......4..............C..........n..2...7...S......?.....6.....6...Rich7...........................PE..L....Y.:...........!.........`....................h@................................I...........................................<.......`$.......................8..............................................D.......d............................text...T~.......................... ..`.rdata..S........ ..................@..@.data...p...........................@....rsrc...`$.......0...P..............@..@.reloc...?.......@..................@..B.$.> ....$.>-....v1?7...........KERNEL32.dll.NTDLL.DLL.USER32.dll.......................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):135168
                                                        Entropy (8bit):5.712557269847559
                                                        Encrypted:false
                                                        SSDEEP:1536:yOHs9nZRvH2PP034ynzO8i9smTlTrHi1w9rDQtztKZChBohB1DcXvvhdBJ1Q:1WPvH2P7yzOJ9zTrHi1w9nQBzKWXvz5
                                                        MD5:23D3B53421DB2010647BB2379292863E
                                                        SHA1:49220E4A10E20876CB896DB389345C7B6A9333CE
                                                        SHA-256:B8CBBA9370F4011891B8DAEF34438DC3E3EF2EE9297D3C207FFE3F5ED380A024
                                                        SHA-512:8DF554AB0509BFD7B755342E6C78DC4DB7CFAA9D5C42439052EAFECF8853D5753B8975E8B214B75A46DE2C4FF973F8C93F5C358C29158D707F2544FF3901148D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x@....................,.......P.......,.......T.......................................,.......Rich............................PE..L......<...........!.........p......................................................................................@.......`...x....................................................................................................................text...H........................... ..`.rdata..............................@..@.data............ ..................@....rsrc............ ..................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.8691527276214883
                                                        Encrypted:false
                                                        SSDEEP:96:2IIUH5yvzjhJe5klNxxL3bU1ogumEoQTbbQBCxYmotqDNhoUN:2Ih5yc5klNxxL3boRumErQcDN
                                                        MD5:9CECBCFF995CF75B752130D3137D39F1
                                                        SHA1:6893B2B9F32E12E16F2F5C5D9CBEC3E603B4EEED
                                                        SHA-256:3CCC9887261965B99EC0F2751D3D3096F2E31CBF281E7EA1A9902C814985DB9B
                                                        SHA-512:DB464E70B3141248B3E63449F15D3CD9937F81207B6E32878AAF570FE7B027E1651061F808AA9670017A00B3694824061F06F03E3F446423A633C892AB08C638
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........?...Q...Q...Q.j._...Q...P...Q...B...Q...Z...Q...[...Q...W...Q...U...Q.Rich..Q.................PE..L....Y.:...........!.........@............... .....@.........................`......................................."..6.... ..P....@.......................P..................................................D.... ..T............................text............................... ..`.rdata....... ....... ..............@..@.data...L....0.......0..............@....rsrc........@.......@..............@..@.reloc..b....P.......P..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.5243719406147602
                                                        Encrypted:false
                                                        SSDEEP:96:R5XacropfVAbDWmqXUv+lzoY9W2+xiRfhDbRIQYcvEYmotqYC1hoa:NrCmbDBqXw+hbWM1aQDmYC1J
                                                        MD5:6D669FC0192A4F685147B5C7BCF637CD
                                                        SHA1:ED0FECDD48D49645C89CF23056F9310EEA0BB23C
                                                        SHA-256:3F75A0AC5BECFB33C9CC0312B486D45BCD528992FD6EABA7FA7A1539FC7F4F49
                                                        SHA-512:2E23EA333461FE9110E2FA6F83214BA9C83C002EB3CBFF53CB13A30E44619526D00A8ECD87089DEFCED83947D90726BE5687BC4A9B09C07CCC2333A8299C10DA
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........OD..*...*...*..2$...*...+...*.~. ...*.~.!...*.F(,...*.~.....*.Rich..*.................PE..L....Y.:...........!.........@......!........ .....@.........................`.......................................!......` ..(....@.......................P....................................................... .. ............................text............................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc........@.......@..............@..@.reloc.......P.......P..............@..B.$.>............MSVCRT.dll......................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):3.124598839033411
                                                        Encrypted:false
                                                        SSDEEP:192:LJ2lGLpG+9B8Rzg1auG+i3OeJrcTtWrgwx9r+jCNFeOp5m:LJ2l69Y4a6eJrUtWrgS9r+jCN3Y
                                                        MD5:347E011F0164DB9CFAC6BB066BAADEC0
                                                        SHA1:116E90AD2358FC31F0C9F86035895BFE9A55A8AE
                                                        SHA-256:67263AF5AD1B9E0CD7A9088B8BA0CA2D05995E73F6E2ADBDDABD53E075BA9533
                                                        SHA-512:707FA48E83BF497540A8D688975D8A885E005ABA321C179BDD95B123573786BBB29E4CB176D46291E945068D8EFE6047C393E6303F925ADC2F64F9CF551912B9
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1=..u\x.u\x.u\x..@t.w\x..@v.t\x.u\y.[\x..Ck.|\x..|s.w\x..|r.p\x.Z~.t\x..||.v\x.Richu\x.................PE..L....Y.:...........!..... ...@.......*.......0.....@.........................p.......<...............................4.......0..x....P.......................`..................................................l....0...............................text...0........ .................. ..`.rdata.......0.......0..............@..@.data...d....@.......@..............@....rsrc........P.......P..............@..@.reloc..,....`.......`..............@..B.$.>0....v1?=....$.>H....$.>U....$.>a...........KERNEL32.dll.USER32.dll.comdlg32.dll.SHELL32.dll.MSVCRT.dll.....................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):2.744540447798788
                                                        Encrypted:false
                                                        SSDEEP:192:X/62KJlTcY9alIW9avJMdVxWH/Y9VP0QCKFYOpf:X/62EcY9JEavOdVxWHQ9VcQCOT
                                                        MD5:7C94ECB0391127848A8F20AFA8FD63F6
                                                        SHA1:53B7FC88913CAB7E4E030504E58DFDA87E395ED1
                                                        SHA-256:BE4C2FE0AF5612C91EAE9AB4D67F5276C46963FACE2D5B734BE7E40B382B7332
                                                        SHA-512:1AF94DE58B00BE9F49046A0EC5A326957B00550DF5E9F7359CF97FFAF219540C98EBEEA10EEF8CEE7388D4690C9B322624D48962F4628D4D65852D07AE9C1BDF
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................@......<......................................<.......Rich...........PE..L...D.5<...........!..... ...@.......'.......0...............................p.......................................4.......0..x....P.......................`.......................................................0...............................text...`........ .................. ..`.rdata..X....0.......0..............@..@.data...T....@.......@..............@....rsrc........P.......P..............@..@.reloc.......`.......`..............@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.318216925570331
                                                        Encrypted:false
                                                        SSDEEP:384:6W2HDi9HjAqwwbEdrakQnfsm4taun3RICVM6Db9S6echEFROQk9D7:6WIDiJwuEN/3auBIKMcIHRED
                                                        MD5:E09FEC233CCD2C6E9D390787D2F87DDA
                                                        SHA1:264F65809115879521DAAD866792C92D9D3C6539
                                                        SHA-256:709EFD24B655E782C423D2A73A7B6DB687ADA69FEDC8DED6A0C6081A416E8742
                                                        SHA-512:E9388F6645A586BCCEE14C5DCABEC47F7B64505C6998C9100A19E32B8ED98BD058458859E2CD6D063CD61E90CD4D812FC47F42BEC54502DEAA31ED13F2F6A4B7
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........a.....................h.......................................,...............Rich....................PE..L...7<.<...........!.....P...@......-S.......`......................................................................Pe......Ha..P...............................(....................................................`...............................text....C.......P.................. ..`.rdata.......`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):53248
                                                        Entropy (8bit):5.320336268402508
                                                        Encrypted:false
                                                        SSDEEP:1536:MnYrP/rZDN5Cz6y9LUXlnsiUG3eJ/TdY9G:tXrZDazf0lsLY
                                                        MD5:FE8A13548CB544D484496B67D7D6589B
                                                        SHA1:933C66BA98D6090E14E04DB3264D674D4C14921D
                                                        SHA-256:B351DCFBFE03D00A688C488046830D1178A06E6CA86D581388250259098C0C11
                                                        SHA-512:73FEB19916CC5E25B591D5B197AA38E9DEABBCA71A559A5AEA47DB73E9461E720F0674D2A757026E2076B5A0E67F8460B42278084C614E7EA7918023EEDAC785
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........\.Y.=...=...=..Z!...=..&....=...=...=..."...=...!...=.......=.......=...;...=..&....=..Rich.=..........PE..L.....`;...........!.........P............................................................................................h...P.......................................................................................8............................text....x.......................... ..`.rdata..............................@..@.data...............................@....rsrc...............................@..@.reloc..d...........................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):102400
                                                        Entropy (8bit):5.440036346891534
                                                        Encrypted:false
                                                        SSDEEP:1536:1rKnUevheUuLzGUT842VxV40Zi8ooiWC:QtZ6LzLgxhooiW
                                                        MD5:D6AC6D930525ED743418E29802510BBB
                                                        SHA1:F4AD2AE3E144F6BD1E103DF5E40654EEAC29A728
                                                        SHA-256:06228AC38A5052A9430195B1D00546B05E23D0EBE4E93F6E0364D14282369DC4
                                                        SHA-512:DE41F832F2EB4BDA0C158FEFAD0C0DB9170736A0DF916773286564FADC7E32F1713024CCD4EE8DEF3658F4612AF933DF1A8B6FA312B4B92B5F79E9670C864B05
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Xz.z...)...)...)...)...)...)...)A9.)u..)A9.)...)...)...)~..)...)...)...)...)...)C9.)...)...)...).;.)...)Rich...)........................PE..L...B.|:...........!.................~.............@...............................................................`.......x...d....`..........................................................................l....................................text...z........................... ..`.rdata..8........ ..................@..@.data....N.......@..................@....rsrc........`... ...P..............@..@.reloc........... ...p..............@..B.$.>0....$.>=....$.>J....v1?T....$.>_...........COMCTL32.dll.KERNEL32.dll.NTDLL.DLL.USER32.dll.GDI32.dll........................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):57344
                                                        Entropy (8bit):4.985155994169938
                                                        Encrypted:false
                                                        SSDEEP:768:r/LUjp/k9cBvKyKjvyalzmxzaoxz8VeqiX9WHFN1T8Oqm/TKFIJsa:8jp/kWBC0aR8nmLKFIf
                                                        MD5:C57A3BFF1408C33DE5DA5BB1C62ECC5B
                                                        SHA1:1A4DE7F1677689E71C2AC78080AE62687808FAB5
                                                        SHA-256:83EFCAC4F78331E6F8F25ABBEBBC11667E11F46627AB188EC7E00BEB51B9DAC9
                                                        SHA-512:D2E7B4FDF32E45B032823B7A515BB348DB63A1CD63A3EC7D286521FCCDD39870BABD4E82038FE8937CBC8C30F2FF6D2BFBD05F9CE34CFF2A153654B77AFED08E
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........^~..?...?...?...#...?..H#...?..4....?...?...?... ...?..4....?...9...?..4....?..Rich.?..........PE..L....Y.:...........!.........P.....................@.................................5..............................p...........P...............................................................................D....................................text...3........................... ..`.rdata..............................@..@.data...............................@....rsrc............ ..................@..@.reloc..............................@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):2.6466214442096905
                                                        Encrypted:false
                                                        SSDEEP:192:soGk2GtWbZ97gEjWzhQEjIhNFeI59g2jQ66FupdS:soGk2LZ97qljIhNFeW9g2jQ66s
                                                        MD5:B86749B441E49EBD58141871DA7F8DD7
                                                        SHA1:83C1D25B2D2803CAB684ECB6F36F2FEAEB79EB4A
                                                        SHA-256:492C644DBEBB7999EA02E2F2CB562C41D1BB10296BCC72900A59F2CA4D5090B4
                                                        SHA-512:84DFF0CEA5E6239090AD3797F5062A1F54DA16FF2387998C415A01C175266F9127CC4A123ECBE98DADD4940E125DCD7A08FF9993DC4B671FF058BC251C6DA5FE
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.a./k../k../k...w...k..rI..+k..rI..-k../k...k..Mt..*k..pI..,k...m...k...K...k..Rich/k..........PE..L...B.|:...........!..... ...@.......$.......0.....@.........................p.......)...............................3.......0..P....P.......................`..................................................D....0...............................text............ .................. ..`.rdata.......0.......0..............@..@.data........@.......@..............@....rsrc........P.......P..............@..@.reloc.......`.......`..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):45056
                                                        Entropy (8bit):3.954164176068831
                                                        Encrypted:false
                                                        SSDEEP:384:qi9tF0bg81ZrH7b34Fu2NFuYNFD5Gl8m369SLQJ9yuFpzDt:qiXKbgWrHH3KuIuYzol8m34yuTzD
                                                        MD5:F61DC6C03816ED80201D25FBBB30FED1
                                                        SHA1:3AA785941B1FF7A880228248F94148718FC47146
                                                        SHA-256:5CDC8ADB1C10223A4C3AF25BB192E2FD47F8E83539714661AD4A6FCABB47F163
                                                        SHA-512:E802DD73A1CA937004B3A47E00FF75B744BB2B00A962559684FA01AFBDFC40C3ED4755BC8B5ACA1C57B9A5075B0FB39B1FBB3DD875D5A4F2CB6A88B4CB4BFDEB
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y........................W.....B.............Rich..................PE..L..../;...........!.....P...P.......O.......`......................................................................ph.......a.......................................................................................`..8............................text....@.......P.................. ..`.rdata..-....`.......`..............@..@.data........p.......p..............@....rsrc............ ..................@..@.reloc..<...........................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.1158608664095375
                                                        Encrypted:false
                                                        SSDEEP:384:o0a2aB9b6YzTIy2EdQicNtkjmxHSxb/SI9mviJ4zZ95ewFkK492/T:o0aBBMGMy2EdQicNpR2SiqzWQ/T
                                                        MD5:1AF1B68553F1D5D59158727F6EB49DBB
                                                        SHA1:7386BEAE5AC29E8240F7C1D651F1B0D09B535957
                                                        SHA-256:006D43D8400DD964907D0797A9B9E29A8A8964C11BAD3E7A0E35DBE0DB0506D8
                                                        SHA-512:336C996DDC17F8A7AB39486C6980C88F113B96A672D7243B2971850D3055DC767ED285457374D9B5CEBDAD3BFAA56F7D4774222C7B0CA5D2D63B079B9D354D80
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........cu......................................................!......H.......p"......Rich............................PE..L.....c>...........!.....P...@.......O.......`.......................................................................g.......b..d...............................d....................................................`...............................text....@.......P.................. ..`.rdata.......`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):221184
                                                        Entropy (8bit):6.073107874518051
                                                        Encrypted:false
                                                        SSDEEP:3072:KegzPMHKTjDd/fW+uTASAnjAmqvgvks5eXIm2099RX9O+84IEo5lDNy:hAP0KbdXUAFgZsqImx9OGfo59
                                                        MD5:E1DCB4C37FCCD79578F1B8E376D1B3F6
                                                        SHA1:9351C62C6302F62049485E4C15BA909B8E902C08
                                                        SHA-256:A3186DDE55B8F897C5D953F986B4F0A77797E9617609909C49DA6F3E285AE4B5
                                                        SHA-512:F5D34E397B5075603384DA42A8617A46834C696720B8B71D3E1384EF6B368422E785127165F34F71A92413980DB510BDD72F24D89E7FAC7C65ED3CE251C36A7B
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........P...1.R.1.R.1.R.-.R.1.R...R.1.RI-.R.1.R...R.1.R...R.1.R.1.R.1.R...R.1.R...R.1.R.7.R.1.R5..R.1.RRich.1.R........PE..L.....=...........!.........................................................`......................................`.......p........ .......................@.......................................................................................text...5........................... ..`.rdata..o........0..................@..@.data...............................@....rsrc........ ... ... ..............@..@.reloc.......@... ...@..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):225280
                                                        Entropy (8bit):5.724903191036286
                                                        Encrypted:false
                                                        SSDEEP:3072:q54c1n/ypBau8j3dzRTGT2Idm2tbBu5Y6obbliT/mV:q54vaBtzRTf2Bgmb4TmV
                                                        MD5:F122F3946E0C78A8782BA78153E0A4DB
                                                        SHA1:2932A0217CF396C3EA1D0014E09D24BA7FD6DFD7
                                                        SHA-256:33F3970E1C14EDC4962F8394CA7A30F619516EE6A89535DDDF31017EB084DB69
                                                        SHA-512:15EC323EAA5B1D2863B4AC50A21BCB4647B08A776F7A3C981CCEFB4F0CB6E628A305C060721D0C5494BFDF557706D7415ADD88E5FF6C87B4F0E1F2C83F42B3F4
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@ .w.A.$.A.$.A.$.^.$.A.$Yc.$.A.$.].$.A.$Yc.$xA.$f^.$.A.$.A.$wA.$[c.$.A.$[c.$.A.$.G.$.A.$.a.$.A.$Rich.A.$........................PE..L.....{:...........!..... ...`.......{.......0.......................................a...............................O......xF..d....@.......................`..................................................l....0...............................text............ .................. ..`.rdata..:$...0...0...0..............@..@.data...Q....`.......`..............@....rsrc........@... ... ..............@..@.reloc... ...`...0...@..............@..B.$.>0....$.>=....v1?G....$.>R....$.>\...........KERNEL32.dll.NTDLL.DLL.USER32.dll.GDI32.dll.comdlg32.dll................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):2.0998953021911198
                                                        Encrypted:false
                                                        SSDEEP:96:rIzc50xqjhJtVyhbHxXoCcRXTTpQidqDJpAmJq+QGCGYmotqDMhoDp0LNf:rB5DXwVxXRc9TpQikDDAmJ5QcDMz
                                                        MD5:3DEE1017263C8973FB882989858A5C2F
                                                        SHA1:819B77196B265FE25E12BC26B8298C2B20DFF5A7
                                                        SHA-256:5D64F25968DD379EC2E4C463D0F181463AD7EF476B03D7BA4C730A08FCF8ACD8
                                                        SHA-512:4557B400B2D8E29B6F82D1F32F74A71E64FC21C45CD9B42BD8976C5BF4811A272FFDC703A7C213DF84EAE0C81239EEFD0EFACFC35392A51D47BF1F7FC49ECABE
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................j................................Rich..........................PE..L....Y.:...........!.........@............... .....@.........................`......................................."..F.... ..P....@..0....................P..................................................D.... ..d............................text...T........................... ..`.rdata..&.... ....... ..............@..@.data........0.......0..............@....rsrc...0....@.......@..............@..@.reloc..~....P.......P..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll..............................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):106496
                                                        Entropy (8bit):5.19516961379927
                                                        Encrypted:false
                                                        SSDEEP:1536:gw/iTp1rZP6UpbRfOdkWY+o9uLtOpaYlga+gi4+m6bnStQgc:A1lSUTf2YhatKJogi44nStU
                                                        MD5:1EDC1124D987025B4539C6CCD86FE52C
                                                        SHA1:76C6558A038714C0671BE517DC3FAA47A9804BCA
                                                        SHA-256:54EC7365B4C8AF951C0447493D6D0A32CCBE9C1139CAE4D2252D44DC7B1B8E6F
                                                        SHA-512:18EE07CBAA4A443AD8B61E89BA0E466C065B7BFBE5E14258F280E2C3DD266B0D9F78C0C5580C0F2E3EC3A502D9F7A4AE3A38543F0C8B8178E85EA3C9290CCA72
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............H...H...H`..H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H...H(..H...H...H$..H...H...H...HRich...H........PE..L...4.v=...........!................;................................................................................:..e....2.......P..@....................`.......................................................................................text............................... ..`.rdata.............................@..@.data...T....@.......@..............@....rsrc...@....P.......P..............@..@.reloc..x:...`...@...`..............@..B........................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.3865196823068335
                                                        Encrypted:false
                                                        SSDEEP:96:pvhwqwhJhOjVYee/c5T3mqlh+RIQYcHYmotqYnhoajt5:AqwhJhOBYZ/Q6qT+aQbYnJjt
                                                        MD5:965D0761E6321DB219C4DA55DE285278
                                                        SHA1:D36E872C3D44FE152B1707A57D6165F09275C800
                                                        SHA-256:B61529675C236BE1824D6779C8ECE1363A9BA5470B6F171ACFFBF7009ECEC83F
                                                        SHA-512:5B321F47D03919C5B77853E8BFFF4BC4D5627FD40E069B693EA259048331BB62A14D9D457A1782E208D0692EEDAC34CB72EA118B6A158DAC7E3D74DDBE159841
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......y./.=.A.=.A.=.A...O.<.A.=.@.1.A._.R.>.A...K.:.A...G.<.A...E.>.A.Rich=.A.........................PE..L....Y.:...........!.........@............... .....@.........................`.......N..............................P!..Y...` ..<....@.......................P..................................................0.... ..0............................text...T........................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc........@.......@..............@..@.reloc.......P.......P..............@..B.v1?.....$.>#...........USER32.dll.MSVCRT.dll...........................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):28672
                                                        Entropy (8bit):3.267042919287219
                                                        Encrypted:false
                                                        SSDEEP:384:KXcrE+FLvbmBhm1xgv/89aZ8EDQgeNQnKkG:KXc4+hvbehU2v/PZ8zQnKkG
                                                        MD5:BBBC65FDFBE05CF8D64602D96D1CC73C
                                                        SHA1:3AEDB477B3FCFE064998627DEC3F3E40F11C60D3
                                                        SHA-256:6A0255417D2197E016BBCA41E3C8849CDE951F30C2168225D550B19A7C3C5DBF
                                                        SHA-512:66526FBFC157984334C83C42B13DE2DD56C610DFA513637A5B4A9298B4F05AA4015C8532D640FD4A9524080D92B56A7D847575E0E48AB0513B1B66413F276FB1
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...ir..ir..ir...n..hr..ir..Nr...m..lr...R..kr...R..nr...t..hr...R..jr..Richir..................PE..L....Y.:...........!..... ...@.......).......0.....@.........................p.......6...............................3.......0..P....P.......................`..................................................D....0...............................text............ .................. ..`.rdata..^....0.......0..............@..@.data...,....@.......@..............@....rsrc........P.......P..............@..@.reloc..p....`.......`..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):49152
                                                        Entropy (8bit):5.717620044022021
                                                        Encrypted:false
                                                        SSDEEP:768:TuiZXiv6x2/PBTx30WGdoxJ3jiB9WQgK1JJ+Fo7YIi8E1u:Tupv6EZTx3CoxJRQDUoGE
                                                        MD5:EEACE14739B3E836F44D661C0042F223
                                                        SHA1:24F5967B7B12DA1ED343A73D723FE6FDFEA7F301
                                                        SHA-256:11DF90CC11DFEA9D9D7F2DA22CFFEF805CE658F6AB3E2150861EEBF03D690CA1
                                                        SHA-512:912FBB92B92A3A0BE65514FF13BEB6195A4631EFCDDE4231D48AA516DD59BAEC8D6FD125525B991A95D78B93EB0D6CE75C59D32A2463A83928ECEA8D1BDA5894
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........<...o...o...o9.o...o9.o...oR.o...o..o...o...o...o..o...o..o...o...o...o..o...oRich...o................PE..L....Y.:...........!.....`...p......y .......p.....@................................_g...............................|..[....v..<...............................................................................D....p...............................text...._.......`.................. ..`.rdata..[....p.......p..............@..@.data....<....... ..................@....rsrc...............................@..@.reloc..L...........................@..B.$.> ....$.>-....v1?7...........KERNEL32.dll.NTDLL.DLL.USER32.dll.......................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):24576
                                                        Entropy (8bit):1.965175828785223
                                                        Encrypted:false
                                                        SSDEEP:192:xGqtPxX4u8XuBxGkkUiRh8jJmmj2sucQgeh:xGqdSP4xPibOMm/Qgeh
                                                        MD5:7BBBE3749D17CD539623C60F5E023992
                                                        SHA1:E0769AEA1E7EC30DD33AC022E8C1D0F79983BE36
                                                        SHA-256:D8F7E302FD89ACD8EE36FAA07214ED3B6039F91EC45F72FC954967C04FE906FF
                                                        SHA-512:86AEC1D8FC59DD7B8F86815928196798FD6C0288B331B552298CDD157025B7BD3CD9ED84C0A07D4B3D5ED347AC0B2944931AEC9FA15D9ABA1DDFC8796619AE40
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...ir..ir..ir...n..hr..ir..Nr...m..lr...R..kr...R..nr...t..hr...R..jr..Richir..................PE..L....Y.:...........!.........@............... .....@.........................`.......!..............................."......h ..P....@..(....................P..................................................D.... ..h............................text...~........................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc...(....@.......@..............@..@.reloc.......P.......P..............@..B.$.> ....v1?-....$.>8...........KERNEL32.dll.USER32.dll.MSVCRT.dll......................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {D529246B-78E5-4E65-A3A2-8E1040E91E59}, Number of Pages: 200, Title: CF Remote, Subject: CF Remote, Keywords: Installer, MSI, Database, Author: NC SBoE, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: Intel;1033, Number of Words: 8
                                                        Category:dropped
                                                        Size (bytes):868352
                                                        Entropy (8bit):6.2747798286558885
                                                        Encrypted:false
                                                        SSDEEP:12288:XvLiSxEFm3BKXsbzlDSJjQ8guBoN2KA2wKc7wMz7:/LiSxdW5BqPA2fc7wMz7
                                                        MD5:FE1833DD19D1DB9BB590BA771A5693CF
                                                        SHA1:F0E719A4DC2809677289DB6059B07F2678A6823E
                                                        SHA-256:10D18CB27F4A7DF11252213FC839D25E7FA59C997B8D02566D0538BC0E52F163
                                                        SHA-512:5A1C2CE4CA98BA47FA326AA660B827BC25CFF22D3CD9E0D9C8D960E797AC87FC9536599095670283037CE0A01C6DBB2A24C6E2F7911FF5335A174324BDDA1CC4
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {D529246B-78E5-4E65-A3A2-8E1040E91E59}, Number of Pages: 200, Title: CF Remote, Subject: CF Remote, Keywords: Installer, MSI, Database, Author: NC SBoE, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: Intel;1033, Number of Words: 8
                                                        Category:dropped
                                                        Size (bytes):868352
                                                        Entropy (8bit):6.2747798286558885
                                                        Encrypted:false
                                                        SSDEEP:12288:XvLiSxEFm3BKXsbzlDSJjQ8guBoN2KA2wKc7wMz7:/LiSxdW5BqPA2fc7wMz7
                                                        MD5:FE1833DD19D1DB9BB590BA771A5693CF
                                                        SHA1:F0E719A4DC2809677289DB6059B07F2678A6823E
                                                        SHA-256:10D18CB27F4A7DF11252213FC839D25E7FA59C997B8D02566D0538BC0E52F163
                                                        SHA-512:5A1C2CE4CA98BA47FA326AA660B827BC25CFF22D3CD9E0D9C8D960E797AC87FC9536599095670283037CE0A01C6DBB2A24C6E2F7911FF5335A174324BDDA1CC4
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):389632
                                                        Entropy (8bit):6.443465180760872
                                                        Encrypted:false
                                                        SSDEEP:6144:zgj8g8Sy2AoNSlkJAiL9svGFXFPvA2wKcWQwMYW7rmk:zQ8guBoN2KA2wKc7wMz7
                                                        MD5:89B5903624F9CDED346676E88F918693
                                                        SHA1:162201E4E31FB327E0B16531C81041DC574A04A4
                                                        SHA-256:851BB0A420E47AF2F49518FAE86E4B9755BD5DAA6E9EB3B2F1FC4585B6F05163
                                                        SHA-512:FD2587EF52E43EC131E4D06A34306E038B85B98E9EE2866FFD117E906B019FBA6972B794BEC2A9E0FEF357E199A0D13E64A89D4356EA8BF6CAFD6A289B1B48A7
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...>=xQ............................d........ ....@.....................................................................E............p...&.......................}...................................................................................text............................... ..`.itext..|........................... ..`.data....,... ......................@....bss.....P...P.......8...................idata...............8..............@....didata..............J..............@....edata..E............L..............@..@.reloc...}.......~...N..............@..B.rsrc....&...p...&..................@..@....................................@..@................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):144384
                                                        Entropy (8bit):6.043448081977129
                                                        Encrypted:false
                                                        SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                                        MD5:6484BEE1546FEB56595EAACF5D019C55
                                                        SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                                        SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                                        SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):144384
                                                        Entropy (8bit):6.043448081977129
                                                        Encrypted:false
                                                        SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                                        MD5:6484BEE1546FEB56595EAACF5D019C55
                                                        SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                                        SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                                        SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):144384
                                                        Entropy (8bit):6.043448081977129
                                                        Encrypted:false
                                                        SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                                                        MD5:6484BEE1546FEB56595EAACF5D019C55
                                                        SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                                                        SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                                                        SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):83494
                                                        Entropy (8bit):5.589631043668988
                                                        Encrypted:false
                                                        SSDEEP:768:uaBy/r4EAt/D25v7l4NBf/TxNQ6b7Ndp8W7fZudiuKlbBWHVE9rDvZF3qUfQSUvO:Xs4EAt/a5v7mbQm9PZVqUf6jq
                                                        MD5:147D53A3C4B7C132B0B306122277AAB3
                                                        SHA1:90F45CDFEC6ADEADB09B4BC20FB6CA963D673A40
                                                        SHA-256:8EF898A7E9881950EC130A6A0E8613F7F12D567050010B068E4F461D415E9E53
                                                        SHA-512:C71AB592E08FB9264F1C4067FA0B18216BFA5221C2E234D2E62F9E758096439BAD315ACCCC96C2BB1A55F21094B41167281BCD673330F1C76B2D2662B5133AE7
                                                        Malicious:false
                                                        Preview:...@IXOS.@.....@CjYY.@.....@.....@.....@.....@.....@......&.{152D390A-DD7B-4E57-B3A5-14CADE7E1207}..CF Remote..cfrv_4_0_setup_ALL.msi.@.....@!....@.....@........\PROGRA~3\mia3DCC.tmp\&.{D529246B-78E5-4E65-A3A2-8E1040E91E59}.....@.....@.....@.....@.......@.....@.....@.......@......CF Remote......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@_....@.....@.]....&.{DBAF7F90-6797-4BCB-8426-E799FE0D75FA}...@.......@.....@.....@......&.{10B1E2F4-E12B-4D18-847D-3579632C4DA0}...@.......@.....@.....@......&.{70233733-63B7-4686-8B22-F467B98A5511}...@.......@.....@.....@......&.{100D9843-4837-4C77-9382-C4AB79C16EC6}...@.......@.....@.....@......&.{360CA8FA-B89D-40E5-8E5D-E0358F8448B5}...@.......@.....@.....@......&.{AAA707EE-74C6-4091-8DF1-A6063B1CAF22}...@.......@.....@.....@......&.{9C72C003-1DC2-41F4-AD0C-E99FEB6FE846}...@.......@.....@.....@......&.{E66B3D7D-9A68-4B63-9A00-00FE935
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                        Category:dropped
                                                        Size (bytes):32768
                                                        Entropy (8bit):3.441375331321473
                                                        Encrypted:false
                                                        SSDEEP:192:SFNh1I7ZcPo2PNN+yXv692R+VJYwMvbU:Snh1I7ZcA2iy/699JY1vbU
                                                        MD5:2ACE0C12191156551CE3E04B931BDFA5
                                                        SHA1:860C8289CBBFFE6DA4F890BF29A2B4D4CE5FAD07
                                                        SHA-256:3335EB247248D6E968B840A1FD46DD455DBAA99DEF7092904BA029BC798B7950
                                                        SHA-512:A3B93EE7200DA995A072BF8DF439F87D71469D13CD4AA823CD9332C6CB015EF3AFCE4D7BD37319CA2CBA88C0C596869F419C0C8CE96CC3ECE89B66EBDA18CE25
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):1.846492732431202
                                                        Encrypted:false
                                                        SSDEEP:96:ehN1nFToI6T8lMTwCRmz8e/mqscIXbcP91GxbOVe:21FMLgIw94JrcF1He
                                                        MD5:907E80B6206D1A3D100CC9CCDE8AB850
                                                        SHA1:C3C4E3970D4271794200195BBCF75A5EEB31B3DE
                                                        SHA-256:D769417ECD8DB6DFC88BAF8B9F528460C7D6343B44CFDFE5D5FB0266F7EDD323
                                                        SHA-512:89D8548A05CEF566F32915E4BCAFBF2667CD4F8AC8867885FA76AB02E018D5D3D16B97D1A4EB7AD5E917F33519BF399C28E69D679B51BA34FEA3866A78621ED8
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):432221
                                                        Entropy (8bit):5.3751616202005135
                                                        Encrypted:false
                                                        SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauh:zTtbmkExhMJCIpErg
                                                        MD5:8E645ECE20D4D62EF51BBF44F571F5E5
                                                        SHA1:F779FAC8B13341D73B6E3810B001C322A166B6DB
                                                        SHA-256:9897D6187E7D22E4A3C2F127C681D7B3777325E49F9FFE4F63538448277362DF
                                                        SHA-512:01EB830325BB7F67D56C23EA4E0768BB8ABB241C012E62B79A78ABE46C258C306E6F1B71F1A62C7C3C92666D5C5F495FB09FACABFF4EFCD1FBBEDFCF3C7B40F8
                                                        Malicious:false
                                                        Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):307200
                                                        Entropy (8bit):6.383146474711384
                                                        Encrypted:false
                                                        SSDEEP:6144:mzdLJkXstL6iKvwzVLb34armOHi7+m463cG/CzQYQ8rk4TCmiSippnec:mxJkXWL6iKvwzVLb34armOHi7+oXzff6
                                                        MD5:FD64262820E74C63BB0D97061776C234
                                                        SHA1:28FC641E0154BCFDF383EDB9D28245F2873E4A12
                                                        SHA-256:2AE2BC42BC655010F11C2686EE4C318F07D6C1CF3EBC79A8E1FBDB57A49A2CC4
                                                        SHA-512:C26D4400EB99A425C886C1707D00A87018D4B0375FCFF39F127DC8CD26DA5114D73233868B99317C7415366D9B26D861DE321110F0F14E31623560A7F0F66826
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..l{.{?{.{?{.{?..w?z.{?{.{?z.{?..h?..{?..u?z.{?..q?..{?{.z?..{?..p?W.{?..}?z.{?...?}.{?Rich{.{?................PE..L... .t9...........!.....@...`......./.......P.....(....................................................................\......d....`.......................p...4...................................................P..4............................text....4.......@.................. ..`.rdata......P.......P..............@..@.data....V.......`..................@....rsrc........`.......`..............@..@.reloc..N8...p...@...p..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):32768
                                                        Entropy (8bit):2.8457754129966433
                                                        Encrypted:false
                                                        SSDEEP:384:7GiZrKbKxGbk5MOqerr5iKVHHgEKZ2ajjH:tWbKxGbk5MOqirbngbj7
                                                        MD5:2D9A1115B872258CFCD657E32A2955B8
                                                        SHA1:23021F48D1F741BF04F79DB49202A0A3243F3D05
                                                        SHA-256:5D137E1FE18A51D7A7AA6B5F67BA55E00ADB44155F771F81F56A22418FA8EB6F
                                                        SHA-512:F08CEFE2F8D208CBD554B673300536C69C0F08B016B236293CAED0E62C7393CBABC4F8D377EC5BB05D902DAA96B3370648CF188C0B5A0989AFBEFCDFE0B3F205
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L...M.t9...........!.........p...........................................................................................................]...................p.......................................................................................rsrc....].......`..................@..@.reloc.......p.......p..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):290816
                                                        Entropy (8bit):6.551645416298201
                                                        Encrypted:false
                                                        SSDEEP:6144:sP1hcYD9DDW+j8PPk/axspmqPugvLRyoVLNMIrZO:sPPZ9Dq+oPkwspm2+uO
                                                        MD5:DFCEEBC9D6DBB3DB56B735C7020A35D1
                                                        SHA1:189F681C860D15E997F3ED4502D747F25656BAC1
                                                        SHA-256:09687C007B9D0C4047BC42C58C54E6DB62B9614306AC6DCBCD1B7532CF5ACF17
                                                        SHA-512:15E73EFE925572ED9FDD11C316255880F7F131BEE084121B28B8507AB88E95FC22CDB9D606481CA499BD2BFDB61E871A2F026CEC56F5B747388237E3FB752351
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......'"..cC.OcC.OcC.OcC.O.C.O.\.OkC.O.\.OeC.O.\.O.C.O._.OvC.OcC.OfC.O.c.O.C.O.E.ObC.O.c.ObC.O.c.ObC.ORichcC.O........PE..L...K.j9...........!................G0.....................................................................................`...x....@.......................P...8...................................................................................text...R........................... ..`.rdata..............................@..@.data...............................@....rsrc........@....... ..............@..@.reloc...?...P...@...0..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):1.807152052248964
                                                        Encrypted:false
                                                        SSDEEP:96:5qsN56E9EADBVzBDaZBcG6fyXmuY+eQ5TMbKGbMH7x6sTFw+YprWUUsmn+sWiNBg:5qP1ADhAZXmuY+LubKRc6smh7
                                                        MD5:859751A660914A75FB9062E47B7111B5
                                                        SHA1:741752CECE787A377987A3C329238E87B1AEBBAE
                                                        SHA-256:7DDDB9C0D38C2BC47EA44B0B5F73A1A6411BC0069AFD4B42AECD79C92D1666FE
                                                        SHA-512:8D8D3278111BCEA19781A3523F863B378BDA40D8AB580775CE6664F080777E5F83C4F0EAA42A98363A0842F6DE9FD47CEDB1AE5DD42AC5D04BB046A6213A4F94
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L...E.j9...........!.........@...............................................P..........................................................X!...................@.......................................................................................rsrc...X!.......0..................@..@.reloc.......@.......@..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):167936
                                                        Entropy (8bit):6.187995719559416
                                                        Encrypted:false
                                                        SSDEEP:3072:RiT9Mjz9fxT8ms8xHZaKV6AORqrkcNnVn6u7OtP:RvfxFHZdYOk4nVnf
                                                        MD5:56A8FDC2477954D863C92D08675FFE57
                                                        SHA1:00E91FC7856C20F05E7203CE3BA72F2F0F78BEB2
                                                        SHA-256:B39FE18BFA62BA1A2F1D680B3505100448F3CB3ABE49B6D55B3DFFDF430E25BE
                                                        SHA-512:233379A84A523A890E593C7550344CCA982E18A5F5A91B42209304279CD0F0798AEC67D9BC897769A537C2DB617E9A2210EB5A5E1A0E6C388AC0A70CE8A40FD6
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................%....Y..........Y.....a....Y.....Rich...........................PE..L...E.=9...........!.............................n(.................................................................................`.......................p..X....................................................................................text...r........................... ..`.rdata..sf.......p..................@..@.data....+...0...0...0..............@....rsrc........`.......`..............@..@.reloc.......p... ...p..............@..B................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):2.452431739694398
                                                        Encrypted:false
                                                        SSDEEP:96:50f6X9EKZaMwah+RtQl9X8N5MMJigpFnUqmspl65z+muijdwMDRaaPp/MQaf:50CaKHwah1wF3TWd/Rama
                                                        MD5:3243A8F5DB572EAE76FE2348B2E106C0
                                                        SHA1:9DCEE517723C6B2206C83C065B4C0B889B69E0DD
                                                        SHA-256:B7714239D578D588B1AECC55E89DC6327716F43A4CB68627ABFE30AB344AF460
                                                        SHA-512:98F5F5BCACB3B86EA05E493883D62744E20351334A71D7E3066D177797BD132A51B647C60A485E05041E3A1F6003E0D093D267AEFD0AA5DD3008C44676426E05
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L...G.=9...........!.........@...............................................P...........................................................+...................@.......................................................................................rsrc....+.......0..................@..@.reloc.......@.......@..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):4.673313433135478
                                                        Encrypted:false
                                                        SSDEEP:384:xEXQnim4w2xSKOJtcLFZdMQzf3M7TnSYkN9A/hqycPGSpzuE8d+chaz:xEcim4uUFgQzf4nSH9A/hqycesuac4z
                                                        MD5:1783A2BC9AB938AD923D2040B4ABB243
                                                        SHA1:CA6EABACF16E56723429F65CC5D592699015783A
                                                        SHA-256:0D4B4BAE969E25267C54B367AC9760A718869ACB793CC1380D3A37767BC8E63C
                                                        SHA-512:1A3790C55A7015F4D867C76CB6F4E2D483818A9534E5F4EAD73E44E19B876672EE4A9AEA9A4960E37F729B3C428C40755023FDA7D197064793002B2FFD5AFC20
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K...*...*...*...*...*...5...*..X6...*..$....*...*...*..$....*...,...*..$....*..Rich.*..........................PE..L...].=9...........!.....0...`......j6.......@.......................................................................N...... C..................................@....................................................@...............................text....,.......0.................. ..`.rdata..d....@... ...@..............@..@.data........`... ...`..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):942080
                                                        Entropy (8bit):6.65646975675861
                                                        Encrypted:false
                                                        SSDEEP:12288:c30LOWsXFbwAlSc96WPwYW0WxgERNUzD71h1PTMNy:vLOWsXiAlS86WPhOvNUANy
                                                        MD5:4FCCBA7B1CDF3BC6EA31F1B0627AE8EC
                                                        SHA1:770725AF1E58CA070AD3456D8572B3E04A70B7EA
                                                        SHA-256:D97B3B00646FED52DF6855EFBA4269B63F1263EF32B3E477E1E2236A7F126F4E
                                                        SHA-512:0786A923077CC4BA30E79C052590D571F54DF3E3B01BC6F9781B7E0ACF0E3F5D2549641C1CA11ABDCA064D88728F33B7E63C07DFE0D09D19AE339ECB6F86F6E3
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^x4...Z...Z...Z.a.V...Z.G;Q...Z..T...Z.G;P..Z.L.I.c.Z.D;Q...Z...[...Z.x.I...Z...Z...Z..9Q..Z.E;Q.0.Z...\...Z..9^...Z.Rich..Z.........PE..L......:...........!................g................................................................(..............p...>........................................v...................................................................................text............................... ..`.rdata..............................@..@.data....>..........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):69632
                                                        Entropy (8bit):3.5687827741608045
                                                        Encrypted:false
                                                        SSDEEP:1536:ZWJaaymHs15LBdFElh9aaaD+FdhaG9AFqg24CHgSz+Qar:ZWJaaymHs15LBdFElh9aaaD+PUG9AFqQ
                                                        MD5:E8C7545574E4D9E9992CB5B9331271CC
                                                        SHA1:CF271D3B4A88DA069E61D1269DC8EE412695C69D
                                                        SHA-256:14A788E493779B3FD96C1F94D7154642E79F34594B978A6A7E39C97BEC5F7E5B
                                                        SHA-512:F4A5E5D7F2D162260F150E4F3069F707E0D3C291E0766720E813F5A40D410A67AC18DC03ED5DC7B5DF579A8A3BFCA4F5EF667D16733B853D11104F0C7F165E90
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ 5.A[..A[..A[.hG]..A[.Rich.A[.................PE..L......:...........!.................................................................................................................................................................................................................................rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):622592
                                                        Entropy (8bit):6.077970194897055
                                                        Encrypted:false
                                                        SSDEEP:12288:H31fVUPM+u1u6RS/olZNeQ1d6JjH/bldq8CMKtBBxSftKaXnDsju:7UP3u17xJ1cHrqTxGt9Xg
                                                        MD5:48713A483F2C48ECE4AF4F098A13469F
                                                        SHA1:D8F6BEDF737C52DA16B560E96DCE45889162D50B
                                                        SHA-256:D6E26D47CC578B701FBB9491D8DC5B3CAB317FE92F447387905755AB8F2DC991
                                                        SHA-512:2F01361C7B3D5326B2BC9D86DA47F49E98380DFA967C33E4DBB446C02278F412EDE5D9088F431E2E3EF3960E7F6F858C94F53F576CE3C87C2356FA7919758849
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X..c...c...c..o...c.,.m...c...i...c...g...c..p...c...b.=.c...S...c...R...c.h.e...c.P.g...c.Rich..c.........PE..L...8Y.<...........!.........p......U...............................................................................@...........d....`..|....................p..L.......................................................P............................text...V........................... ..`.rdata........... ..................@..@.data...<"...0... ...0..............@....rsrc...|....`.......P..............@..@.reloc.......p... ...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5042233
                                                        Entropy (8bit):6.348947882126544
                                                        Encrypted:false
                                                        SSDEEP:98304:WJdA7Kn4uYmR88wV1s8dxnve1RZ3BUE9nPdf9avG37EuY:WJy7OymLH8dhg3jPdWGLO
                                                        MD5:2517D67C02B04B3D07FEF74501D6E303
                                                        SHA1:8FE46EFC7F3810358F31AC45B87BB54F08C4FFFE
                                                        SHA-256:A1B0116C01EFB841A263DF2A7BA261FB1B131169C0974E90383535F90C704C83
                                                        SHA-512:3032B05A178BA384693A02AC221B394CA3FDA60D7A0EB2D4039A31C527721FF458A1E486CC0C32834E35A3A2D3F4EF0237368D7E5F084267327EB650239CD3E1
                                                        Malicious:false
                                                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.........."..q..q..q..q..q...q..q..q..q..q..q..q..q..q..qn..q..q..q..q..q..q...q..q...q..q..q..q...q..q...q..q...q..q...qb.q*.q..q...q..qRich..q........................PE..L....t.?...........!......4.........#.2.......5...............................M......................................J<..j..l.<.......?......................I..^..`.5...............................................5.T.....<.@....................text...>.4.......4................. ..`.rdata..E.....5.......5.............@..@.data.........<.......<.............@..._CODE....*....>..0...@>.............@....rsrc........?......p>.............@..@.reloc..".....I...... I.............@..B................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):294912
                                                        Entropy (8bit):6.112628297874781
                                                        Encrypted:false
                                                        SSDEEP:3072:I5BjEZYf0mpCQWkmQFkC7SmmNLT1uEfhuVQA6nBgvWKwnvOtzC/8gfPACQ1pH2pE:zYf0mpC3kdFkC7SLLsmA6ESubhD+TU
                                                        MD5:70B34D924E4DBA93BDB051C50B76A935
                                                        SHA1:F3E1B375A577585F89482A78ACBCD92D3CC37796
                                                        SHA-256:80E70DFB52DF7F6DEE86C1DC174799FAC4E189550ED9E0B07AEB26F29E072F40
                                                        SHA-512:124584D8857A604C6B4026C36150074AFB3760893E464A5B2323551BD1E385D763A7FF2E5F5ACAA265AEEB766C08F486673BC9C13ADB53F9EBC03C380AF5C7D5
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=..uy..&y..&y..&...&...&...&l..&...&v..&x..&{..&y..&x..&/..&s..&...&p..&y..&...&&..&_..&...&x..&...&x..&Richy..&................PE..L...y.R;...........!.................................................................................................3.......+..........p....................@..$9...................................................................................text............................... ..`.rdata..[...........................@..@.data....O...@...@...@..............@....rsrc...p...........................@..@.reloc...H...@...P...0..............@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):18944
                                                        Entropy (8bit):6.082251537771566
                                                        Encrypted:false
                                                        SSDEEP:192:Isp6yEkGeVt7mdxy6BhUDwDBEKhixWPGqLukwRWxlRYlRXwHV1UBoN4GI6slUx:Vp6yGeVABrKcb7hjYjXwHHU04GJso
                                                        MD5:0A0324A4282DF0F2C3129E5BD84077BC
                                                        SHA1:5A4FB357AD6A245F75213C5F5593AB8F57E613DF
                                                        SHA-256:11B4C417769C5C4729165C8CA0567F7D3B06D4B82998AB297D59ADBAD9F74D5F
                                                        SHA-512:6074AE20F520449B5F3842F866BB8455B16E488C6D81BFBF898844C821D35EFC036B4DEEB9600502A54287050FE392BDA533FEB112B8A593F30CE779D1045646
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-..2...........!...2.$...".......".......@....(%...................................................................h....p.......................................................................................................................text...?#.......$.................. ..`.bss....$....@...........................data........P.......(..............@....idata.......p.......>..............@....edata..h............@..............@..@.rsrc................B..............@....reloc.. ............F..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):796
                                                        Entropy (8bit):2.1709395683364
                                                        Encrypted:false
                                                        SSDEEP:3:2Ao1ihaQDeFS4qs//l8AqjXF1WX0jpuqje2up1Y1p7vuV//14En:251peeFuE8Aqju0jFjenw7WVX1j
                                                        MD5:892C3A800773081A9110542550B11EA4
                                                        SHA1:A9D593E2FA8A59D4F4425DD7679B3D600B47D3F9
                                                        SHA-256:03EEA05D4F15377229E49E38887D2B2BE57E80988FF9741F15F4A6C1EF377562
                                                        SHA-512:68C3021FC86328473A45A56AAE1FF0207956C72392036DB6B4CD67803C701C61B686F925C527DFDAE1A1F98806C10C4A107949113E0306720B699844C97D6999
                                                        Malicious:false
                                                        Preview:........(.....Z`.O.K.$...?..-.{P./.;.T.x............`...................................DataDirect ODBC Driver Pack.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5206077
                                                        Entropy (8bit):6.315774370780597
                                                        Encrypted:false
                                                        SSDEEP:98304:LSZEWBxyRHvEK6Y/aZ8HhzAhCpmwks9XiyINsv:8zoRHvE8/i0wzwlssv
                                                        MD5:557903CB9179A5A8CFA6B852049E3884
                                                        SHA1:CDB5AEDA1D9E08E9A3AEE6CA58E0542571050680
                                                        SHA-256:F4E3E3B0699A3F80B7911C64AB17A74F8018B456DCA94A4F5F936B7A7F268466
                                                        SHA-512:77537EACF5D8204C998FA3731FB345C2439DE5672D5C256520BC731F8A8C4937E7F7D7E3A42BFD79E7E401375083F7E5706A24AB97B1D3E1FCEFD9F252AC39FF
                                                        Malicious:false
                                                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.............C...C...C..C...C..C...C..C...C...C...C..C...C...C...C...C...C...C...C...C...C..C...C..C...C...C3..Cl..C...Cl..C..C...C...C...C...CT..C...Cl..C...CRich...C........................PE..L.....g>...........!......4..@......cS1.......4...............................O......................................*=.....p.=.......?.......................K..w....4...............................................4.|............................text.....4.......4................. ..`.rdata........4.......4.............@..@.data........@=.. ...@=.............@..._CODE...P*....>..0...`>.............@....rsrc.........?.......>.............@..@.reloc..2.....K......pK.............@..B................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):49223
                                                        Entropy (8bit):4.109718425650408
                                                        Encrypted:false
                                                        SSDEEP:768:+ccYopyfE7saYHK54TbAG9sAiw6SlglrtA:ZcYop1gaYO4oG9sAu/rA
                                                        MD5:9B7EB9FB8DF4F52965CBC4808EA5062D
                                                        SHA1:5D516D6F766A1911C7F1AFCC9B71A2A90F426B02
                                                        SHA-256:30BA60E53FACB1F6AB703108688CE281DFEBEAE01A203DE0D800EC6DE5089538
                                                        SHA-512:C69D998736D2F6CCF515D35436EE0CCC32403F0A6A0E22F28CCCBAF837D65D027E5470DC5805A02ED599DFDC32B113CB394EACBBDBD4B5879EC2C30805D55304
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......uFq.1'..1'..1'...;..4'..0...3'..g8..9'..1'..)'..S8..4'..n...4'...!..0'......0'..Rich1'..................PE..L..._.{:...........!.....@...p.......1.......P......................................"...............................PV.......S..d....p...3......................0....P..........................................h....P...............................text...E1.......@.................. ..`.rdata.......P.......P..............@..@.data...l....`.......`..............@....rsrc....3...p...@...p..............@..@.reloc..............................@..BN_.P0......N=...V|)LG....sXNQ...z.[J^...........KERNEL32.dll.NTDLL.DLL.ole32.dll.OLEAUT32.dll.ATL.DLL...........................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):734504
                                                        Entropy (8bit):6.288077088983874
                                                        Encrypted:false
                                                        SSDEEP:12288:nLC3ZqLXl9ZZVvBMISsHHGg17SnXR2HKg/AggAVKBHFEWl:nLIZKXfVvGaGg1mnX8agDy2Wl
                                                        MD5:7AADDC7C334AE959674073439FA92FE3
                                                        SHA1:ABFD7C6ACCE89009D85C619E91010C307E2C06FA
                                                        SHA-256:C0DB8920AC1E460EE34313829245D2F05F2D71617C69F6B568C5C921747E62F2
                                                        SHA-512:FB0BDC3B495C3541AA5DF5D50C020A377F7C024727C95953984B2DA184091AD0FDE9D2B03D7E5AA2D86C8F454EA484ED16741353123E23CC8D9A35624139A277
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O.u...&...&...&.2.&...&^2.&...&.1.&...&.1.&J..&...&...&.1.&...&51.&...&...&...&...&./.&.1.&...&...&...&.(.&...&"..&...&Rich...&................PE..L...'.G>...........!................Q..............`.........................P.......|..............................P.......$........`..pE..........@ ...........v.......................................................... ........................text............................... ..`.rdata..............................@..@.data............p..................@....rsrc...pE...`...P...0..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):66560
                                                        Entropy (8bit):5.764637632023211
                                                        Encrypted:false
                                                        SSDEEP:1536:5a/5Ni0La7Q4JpxsxrkVE55QbK/kglgp8P7M:k/580La7jJpqxrk4/LlgKPo
                                                        MD5:6AF7E771B815A4CEBCB57214B049CE52
                                                        SHA1:99935155D7C4E5693884F1E46955180437070296
                                                        SHA-256:F87575DB6FFCBE1C170A803EA3979D9885A4F13665BCE5DA44FEF5199A9C82B7
                                                        SHA-512:F7765C85F2A5517B2974F26B06794D154F75E8F66589045C6DEEFA99CFF65C6406630A45F057CA1A696AA65B40463E137338C2F1CB4AA047099C3B1B2D7D9F7D
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l..............`..O.....L.....Rich...........PE..L....T.8...........!................`:............nB.................................M.................................._...p...P....`.......................p..........................................................4............................text.............................. ..`.rdata..?...........................@..@.data...........:..................@....rsrc........`......................@..@.reloc.......p......................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):675897
                                                        Entropy (8bit):6.33183612141127
                                                        Encrypted:false
                                                        SSDEEP:6144:szNfL5Tx1o6Ky/9vCgchDAhy6Q0KQ7a3spjQ91fsu6UyepsMtt2+cH9ofSNXczFw:sDR5y0hy6aOa3spjQ9lmMEoqxchYIo
                                                        MD5:CD98432FDB8E13C7C5A940C01D3CCE77
                                                        SHA1:B4C5C3979883252DDBD4534CBB09F2D80F82F3D3
                                                        SHA-256:86C6FFBC5463F3A3410BA18B192556BE39ACC1D99CEC94783A5A9A38610B3CC4
                                                        SHA-512:1AC21A31E613C6D3D0518B3A497364BBEFFB33439F21A8D83A62D25123F4EBCA3A8D3BEF371B09187027BD5D84BBB9DEF7942FDB6B1A51A91F7F426BF1009A54
                                                        Malicious:false
                                                        Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$........=Y.V\7.V\7.V\7.C<.U\7.-@;.T\7..C$.U\7.V\7.Q\7.9C<.U\7..@9.U\7.9C=.R\7.9C3.T\7./}<.U\7./}3.T\7.|<.Z\7.|=..\7.V\6.^7.4C$.E\7.P.=.T\7.P.<.y\7.Z1.W\7.|3.W\7.RichV\7.........................PE..L...e6.?...........!.........`...............................................`.......................................D......$6...................................T...........................................................5..@....................text...N........................... ..`.rdata...U.......`..................@..@.data........P.......P..............@..._CODE...p...........................@....rsrc...............................@..@.reloc..p...........................@..B................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):307200
                                                        Entropy (8bit):6.022609410600443
                                                        Encrypted:false
                                                        SSDEEP:6144:FpQDKIhkfJxWbuqzTZSDS03HSWAuV0W+td9x/LJL:FpQDKIhkfJxWiMTZSDS03yWAuV0BrH/R
                                                        MD5:8394AF480C146EC7F7A554EA1FB8E9C4
                                                        SHA1:C44B3BD7D524A0F37D1171F4066C7BD0AA7E3CF9
                                                        SHA-256:73EE0E2B4822A03136B18AB32C951CFC5E7C68A40B046B82E68B1B156582FC18
                                                        SHA-512:7E7BB50BFDDF3B69813F4A87DCBFC76A6A3DCCCD6CC9F459DCD56A222EF82C980B5B5A900293CE8A6DBDB1C68483443726D4834886AFB067A1A009B875D03E1C
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........oa8...k...k...k...k...kP..k...k...k...k...k...k...k...k...k...k...k...k...k...k.-.k...k...k...k,..k...kRich...k........................PE..L....Q.>...........!.......................................................................................................p........ ...S......................4....................................................................................text...;........................... ..`.rdata........... ..................@..@.data....+.......0..................@....rsrc....S... ...`... ..............@..@.reloc..X .......0..................@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):100352
                                                        Entropy (8bit):6.01574608255945
                                                        Encrypted:false
                                                        SSDEEP:1536:W0/GIQTIfT9Q2qEB+Jk3gC7UfPnJQBJHl8UPif4xStOgkM:NGg98fC43nuBBGU+4
                                                        MD5:59B610DF85409A13832B9B5B807DA4FE
                                                        SHA1:FADFCE97D3D9F6935D5F6A4ACA53232D733AB4C6
                                                        SHA-256:369C08452CE18AA2894442F63C524C4F8DB416F12D86E624099BE61DAD9F2F98
                                                        SHA-512:117D144807C1BC38858859F8417CE69597FDF3B3FAF28D5567ECA58A84CBAC292C87EB54840E8DAC9A0F3CD66F755CE8CB31BC30D78B01A47B09FAA1C2C8B73C
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Nb#P/.pP/.pP/.pP/.p./.p.).pQ/.p.3.pL/.pRichP/.p........................PE..L....V.7...........!.................$.......0.......................................[..............................p5..f....1..d...............................................................................X....0...............................text...P........................... ..`.rdata.......0......................@..@.data...xt...@...D...*..............@....rsrc................n..............@..@.reloc...............p..............@..BN_.P(.../.[J5.....[J@...4..NJ...........KERNEL32.dll.USER32.dll.GDI32.dll.MSVCRT.dll............................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1179648
                                                        Entropy (8bit):6.521473588938597
                                                        Encrypted:false
                                                        SSDEEP:24576:Xm2hiJswkzSpq5Z3jVecFRe+2x3sK6Ms203zviblO8kqO5NnibsBfhUy:X8kQsIOvfhUy
                                                        MD5:D2D3AB42E0FB3AFA8FF6AA9E965D9595
                                                        SHA1:34F244003EF1D43209823CDD946F801AE7A85466
                                                        SHA-256:5AC379FCFBDA3F8DB51CA02BE2C509BD057F17690359F09D4CBB292A67572D6A
                                                        SHA-512:80D468D7495C44988FB655E824575C0DA5ED38FD8A88141FDED106029057E66609CA2E1FF3BA55B0D429FFD737E401F32857A3C92EBCC2ADF97D0B8C49EFEC76
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......w..q3.r"3.r"3.r"n.y"0.r"..|"..r"n.x"..r"Q.a"?.r"3.s"5.r"3.r"5.r"..p"7.r"l.y"#.r"l.x"..r"..t"2.r".v"2.r"Rich3.r"........PE..L...R(i>...........!.........@......<......................................................................................$........P..`$.......................b...................................................................................text............................... ..`.rdata..............................@..@.data..............................@....rsrc...`$...P...0...`..............@..@.reloc..^o.......p..................@..B................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1016832
                                                        Entropy (8bit):5.979344965125846
                                                        Encrypted:false
                                                        SSDEEP:12288:2GBRhi9pc8mQQoBc8wwA21kOR3kkkZkkIkwkpL88888F888nr8H8J28c9fsxkkKO:Px+r
                                                        MD5:A5646553AE51847135D436820C1F21C1
                                                        SHA1:F8601BC366E964DBA7F57C71278F451E2A5E49DA
                                                        SHA-256:740F122FE9707BD4A90048C75B1EB79C86B1B7E852B866517721D2F91CF646C5
                                                        SHA-512:04E97E2120A4805DCABEE5F3E03AFB1DA3646803F86461DD826A44BB39B99DB3E2600A2F4C24A51450F976660B02DC97C0F7FC349A8E38B131C49E56BF5E1F35
                                                        Malicious:false
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..d......T.........." ................ .........@..............................p....................................... ..................E.......p............0...z...............f..............................................................h....................text............................... ..`.data...............................@....bss.....................................idata..p........ ..................@....didata.h...........................@....edata..E...........................@..@.reloc...f.......h..................@..B.pdata...z...0...|...T..............@..@.rsrc...............................@..@.............p......................@..@................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):1.846492732431202
                                                        Encrypted:false
                                                        SSDEEP:96:ehN1nFToI6T8lMTwCRmz8e/mqscIXbcP91GxbOVe:21FMLgIw94JrcF1He
                                                        MD5:907E80B6206D1A3D100CC9CCDE8AB850
                                                        SHA1:C3C4E3970D4271794200195BBCF75A5EEB31B3DE
                                                        SHA-256:D769417ECD8DB6DFC88BAF8B9F528460C7D6343B44CFDFE5D5FB0266F7EDD323
                                                        SHA-512:89D8548A05CEF566F32915E4BCAFBF2667CD4F8AC8867885FA76AB02E018D5D3D16B97D1A4EB7AD5E917F33519BF399C28E69D679B51BA34FEA3866A78621ED8
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                        Category:dropped
                                                        Size (bytes):81920
                                                        Entropy (8bit):2.5049070259559434
                                                        Encrypted:false
                                                        SSDEEP:384:OkXI4JIF+lo3BgQDtJsoH2DWpO/p6gsLrJl:9Tk1AMOB6TL
                                                        MD5:E0F8FC467BB57A114EB7AC512F9B547A
                                                        SHA1:85196200CE69C5C8E2CC5A3DA4CD5C71E409FEAD
                                                        SHA-256:0C32AF2FA37A3ADBA5A55B5D4E30CF55B143EBC70BC6E2EF2113F53E799D0EFD
                                                        SHA-512:B894457426D06D75E001B74C84142E0B299660565531104E12DF778685875BD8CE270203A313D56F4217EAEDC285B07D46236E55F0C817F7B59AC3D7116BA43A
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):2.2945426075130473
                                                        Encrypted:false
                                                        SSDEEP:96:fnCaS2fVxNspq+9L3UXvbTllARl9SvR3cjVJY65B8iC+4sObNmh7gi1Iq+Y+:fCaS2PNN+yXv692R+VJYwMvbUhh1I7Z
                                                        MD5:5C4D02DCBC9C38F779B6131E115427EA
                                                        SHA1:8C775B5DD5748358D0DE5CA748F1C6F264842929
                                                        SHA-256:999A25CA47204AE7E24D63BAB78142DA0F90D7EDC581533B8A3FDBF750910E98
                                                        SHA-512:F323762B23D53C0081E43E7AB3FB970A4B5FB67C4B32E9F0BF4510CDF76B15F7B0827892BBA477B6E9DCD4257A7CE70A644BD7030050A531320118A78063DA95
                                                        Malicious:false
                                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                        Category:dropped
                                                        Size (bytes):81920
                                                        Entropy (8bit):2.5049070259559434
                                                        Encrypted:false
                                                        SSDEEP:384:OkXI4JIF+lo3BgQDtJsoH2DWpO/p6gsLrJl:9Tk1AMOB6TL
                                                        MD5:E0F8FC467BB57A114EB7AC512F9B547A
                                                        SHA1:85196200CE69C5C8E2CC5A3DA4CD5C71E409FEAD
                                                        SHA-256:0C32AF2FA37A3ADBA5A55B5D4E30CF55B143EBC70BC6E2EF2113F53E799D0EFD
                                                        SHA-512:B894457426D06D75E001B74C84142E0B299660565531104E12DF778685875BD8CE270203A313D56F4217EAEDC285B07D46236E55F0C817F7B59AC3D7116BA43A
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):1.846492732431202
                                                        Encrypted:false
                                                        SSDEEP:96:ehN1nFToI6T8lMTwCRmz8e/mqscIXbcP91GxbOVe:21FMLgIw94JrcF1He
                                                        MD5:907E80B6206D1A3D100CC9CCDE8AB850
                                                        SHA1:C3C4E3970D4271794200195BBCF75A5EEB31B3DE
                                                        SHA-256:D769417ECD8DB6DFC88BAF8B9F528460C7D6343B44CFDFE5D5FB0266F7EDD323
                                                        SHA-512:89D8548A05CEF566F32915E4BCAFBF2667CD4F8AC8867885FA76AB02E018D5D3D16B97D1A4EB7AD5E917F33519BF399C28E69D679B51BA34FEA3866A78621ED8
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):98304
                                                        Entropy (8bit):1.724260507839759
                                                        Encrypted:false
                                                        SSDEEP:384:yI4JIFgrJlwlo3BgQDtJsoH2DWpO/p6gs:eF11AMOB6T
                                                        MD5:BD025419062291F73CF35EFD77F302B4
                                                        SHA1:3F68003C5A4977930362D32CB451F9128FA8F5E9
                                                        SHA-256:6C05334D70F46480A0DDEB74E95AA79513006D4D08228F1292E52AD8DAA7F35F
                                                        SHA-512:843C198B90AE1F2E1C3F10C4637EECC9F1B9C88C923A025AC3562A59B7A2BBAC7B30312367A9409FE3C5FFFBC2AAC1F4A9E6DB390784C87F9DD9C8A536F6E09F
                                                        Malicious:false
                                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\msiexec.exe
                                                        File Type:Composite Document File V2 Document, Cannot read section info
                                                        Category:dropped
                                                        Size (bytes):81920
                                                        Entropy (8bit):2.5049070259559434
                                                        Encrypted:false
                                                        SSDEEP:384:OkXI4JIF+lo3BgQDtJsoH2DWpO/p6gsLrJl:9Tk1AMOB6TL
                                                        MD5:E0F8FC467BB57A114EB7AC512F9B547A
                                                        SHA1:85196200CE69C5C8E2CC5A3DA4CD5C71E409FEAD
                                                        SHA-256:0C32AF2FA37A3ADBA5A55B5D4E30CF55B143EBC70BC6E2EF2113F53E799D0EFD
                                                        SHA-512:B894457426D06D75E001B74C84142E0B299660565531104E12DF778685875BD8CE270203A313D56F4217EAEDC285B07D46236E55F0C817F7B59AC3D7116BA43A
                                                        Malicious:false
                                                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):19181
                                                        Entropy (8bit):4.825976110137639
                                                        Encrypted:false
                                                        SSDEEP:96:oSxOPaPzQTs5J/bOss1szQrslkY3LkNXhvfFgUPaPl+7Tfh75q5SEjVT3hmGjkCL:h34fqTwnJqHq0nRXd1pfhwzvOj
                                                        MD5:8030470DD1907B3B20780FBD2D8B340D
                                                        SHA1:C9B79A878ABBEB36F154EAF0D335C6F2B846ABAE
                                                        SHA-256:91A8CBD7E4EAE369677EBD96DFBEA0CE85C57F58496C359173735D16E9D6840C
                                                        SHA-512:C67AF1524FDD49FEFE88C832EAC50B8DCBB0734B4065AE1823DD44DEB0D59CE06E639252E799945CE07FF682B7C911B31295AF54689913564FDE8CDBF7B1CB5F
                                                        Malicious:false
                                                        Preview:.25/10/2024-13:17:53 | Check for Microsoft Windows Installer 2.0..25/10/2024-13:17:53 | Check for VB6..25/10/2024-13:17:54 | Define Setup Globals..25/10/2024-13:17:54 | First Time Install..25/10/2024-13:17:54 | Welcome Dialog..25/10/2024-13:17:57 | License Check..25/10/2024-13:17:57 | ReadMe Information..25/10/2024-13:17:57 | User Registration..25/10/2024-13:17:57 | Setup Type..25/10/2024-13:17:57 | Custom Setup..25/10/2024-13:17:57 | Destination Directory..25/10/2024-13:17:57 | Start Menu..25/10/2024-13:17:57 | Start Installation..25/10/2024-13:17:57 | Prepair Install..25/10/2024-13:17:57 | APP variable equals CF_Remote..25/10/2024-13:17:58 | Install Crystal..25/10/2024-13:17:58 | Install CF Remote..25/10/2024-13:17:58 | Install CF Remote dlls..25/10/2024-13:18:02 | Create Folders..25/10/2024-13:18:02 | Create Shortcuts..25/10/2024-13:18:02 | Before - Apply Install..25/10/2024-13:18:22 | After - Apply Install: COMPLETE - ..25/10/2024-13:18:22 | CRUTL15.DLL - Setup Version: 15.0.0.2
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.994170806029125
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.53%
                                                        • InstallShield setup (43055/19) 0.43%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:cfrv_4_0_setup_ALL.exe
                                                        File size:14'277'760 bytes
                                                        MD5:9197aeadf996dd8cd3885a205927671e
                                                        SHA1:3bf1368b4dae680e580d3958299f9636e255cba8
                                                        SHA256:94e6740812caeb857ef6065984ab4138d56ad4b517c62f2611f303eab519676c
                                                        SHA512:d9709a22c65f95f495d85dc8eb2f686ef1d7d67cb52d36f88c8304668ad91f049495adb1e16dc815297b57127a8dbfccc50fa1a5de334bc7ccc215e35ab1d6a4
                                                        SSDEEP:196608:boV3MNPhVz6u87cGPfIjRHaiBsvZTkqUlrRqFRLRCLWE6UwN3dmjABs3lav9HAjs:u0PhVPfjVaLyrEFRLRCrfwBjUa8J+
                                                        TLSH:E6E6335067EA8260F0FB3B751DB8A6A84937FC259734E1CF8299051EDE72AC19C74327
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ew..............|.......|.......|........t.......b..............|.......V.......|......Rich............................PE..L..
                                                        Icon Hash:46165f4553a1f271
                                                        Entrypoint:0x422c58
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x62E46D6B [Fri Jul 29 23:29:47 2022 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:0
                                                        File Version Major:5
                                                        File Version Minor:0
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:0
                                                        Import Hash:b48671fed9d5ca4906417d42fcdb066b
                                                        Instruction
                                                        call 00007F7A5C6CC579h
                                                        jmp 00007F7A5C6C7CADh
                                                        mov edi, edi
                                                        push ebp
                                                        mov ebp, esp
                                                        sub esp, 00000328h
                                                        mov dword ptr [0043E4B8h], eax
                                                        mov dword ptr [0043E4B4h], ecx
                                                        mov dword ptr [0043E4B0h], edx
                                                        mov dword ptr [0043E4ACh], ebx
                                                        mov dword ptr [0043E4A8h], esi
                                                        mov dword ptr [0043E4A4h], edi
                                                        mov word ptr [0043E4D0h], ss
                                                        mov word ptr [0043E4C4h], cs
                                                        mov word ptr [0043E4A0h], ds
                                                        mov word ptr [0043E49Ch], es
                                                        mov word ptr [0043E498h], fs
                                                        mov word ptr [0043E494h], gs
                                                        pushfd
                                                        pop dword ptr [0043E4C8h]
                                                        mov eax, dword ptr [ebp+00h]
                                                        mov dword ptr [0043E4BCh], eax
                                                        mov eax, dword ptr [ebp+04h]
                                                        mov dword ptr [0043E4C0h], eax
                                                        lea eax, dword ptr [ebp+08h]
                                                        mov dword ptr [0043E4CCh], eax
                                                        mov eax, dword ptr [ebp-00000320h]
                                                        mov dword ptr [0043E408h], 00010001h
                                                        mov eax, dword ptr [0043E4C0h]
                                                        mov dword ptr [0043E3BCh], eax
                                                        mov dword ptr [0043E3B0h], C0000409h
                                                        mov dword ptr [0043E3B4h], 00000001h
                                                        mov eax, dword ptr [0043C024h]
                                                        mov dword ptr [ebp-00000328h], eax
                                                        mov eax, dword ptr [0043C028h]
                                                        mov dword ptr [ebp-00000324h], eax
                                                        call dword ptr [000000BCh]
                                                        Programming Language:
                                                        • [C++] VS2008 SP1 build 30729
                                                        • [ASM] VS2008 SP1 build 30729
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [ C ] VS2005 build 50727
                                                        • [IMP] VS2005 build 50727
                                                        • [RES] VS2008 build 21022
                                                        • [LNK] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3a5d80xa0.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x450000x15748.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x352000x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x320000x284.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x302ed0x304002038b7d87842b64c67b899ba5e78dc0dFalse0.5152303270725389data6.494109860999288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x320000x93e80x94009065fae2bc62d08ab84e542ac170dd32False0.34588788006756754data4.655429443140589IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0x3c0000x84000x24003b1c2c3bd274b21289a8012d58d091b2False0.2587890625data4.215578104820278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x450000x157480x15800b5e79db393609dd64cce69fe68a8673eFalse0.04630723110465116data3.441131579787985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x45c540x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.46639784946236557
                                                        RT_ICON0x45f3c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6216216216216216
                                                        RT_DIALOG0x460640x1d8data0.5720338983050848
                                                        RT_DIALOG0x4623c0x1bedata0.5605381165919282
                                                        RT_DIALOG0x463fc0x54data0.7619047619047619
                                                        RT_STRING0x464500x4a4dataArabicSaudi Arabia0.28703703703703703
                                                        RT_STRING0x468f40x4a4dataCatalanSpain0.28703703703703703
                                                        RT_STRING0x46d980x4a4dataChineseTaiwan0.28703703703703703
                                                        RT_STRING0x4723c0x4a4dataCzechCzech Republic0.28703703703703703
                                                        RT_STRING0x476e00x4a4dataDanishDenmark0.28703703703703703
                                                        RT_STRING0x47b840x4a4dataGermanGermany0.28703703703703703
                                                        RT_STRING0x480280x4a4dataGreekGreece0.28703703703703703
                                                        RT_STRING0x484cc0x4a4dataEnglishUnited States0.28703703703703703
                                                        RT_STRING0x489700x4a4dataFinnishFinland0.28703703703703703
                                                        RT_STRING0x48e140x4a4dataFrenchFrance0.28703703703703703
                                                        RT_STRING0x492b80x4a4dataHebrewIsrael0.28703703703703703
                                                        RT_STRING0x4975c0x4a4dataHungarianHungary0.28703703703703703
                                                        RT_STRING0x49c000x4a4dataItalianItaly0.28703703703703703
                                                        RT_STRING0x4a0a40x4a4dataJapaneseJapan0.28703703703703703
                                                        RT_STRING0x4a5480x4a4dataKoreanNorth Korea0.28703703703703703
                                                        RT_STRING0x4a5480x4a4dataKoreanSouth Korea0.28703703703703703
                                                        RT_STRING0x4a9ec0x4a4dataDutchNetherlands0.28703703703703703
                                                        RT_STRING0x4ae900x4a4dataNorwegianNorway0.28703703703703703
                                                        RT_STRING0x4b3340x4a4dataPolishPoland0.28703703703703703
                                                        RT_STRING0x4b7d80x4a4dataPortugueseBrazil0.28703703703703703
                                                        RT_STRING0x4bc7c0x4a4dataRomanianRomania0.28703703703703703
                                                        RT_STRING0x4c1200x4a4dataRussianRussia0.28703703703703703
                                                        RT_STRING0x4c5c40x4a4dataCroatianCroatia0.28703703703703703
                                                        RT_STRING0x4ca680x4a4dataSlovakSlovakia0.28703703703703703
                                                        RT_STRING0x4cf0c0x4a4dataSwedishSweden0.28703703703703703
                                                        RT_STRING0x4d3b00x4a4dataThaiThailand0.28703703703703703
                                                        RT_STRING0x4d8540x4a4dataTurkishTurkey0.28703703703703703
                                                        RT_STRING0x4dcf80x4a4dataSlovenianSlovenia0.28703703703703703
                                                        RT_STRING0x4e19c0x4a4dataEstonianEstonia0.28703703703703703
                                                        RT_STRING0x4e6400x4a4dataLatvianLativa0.28703703703703703
                                                        RT_STRING0x4eae40x4a4dataLithuanianLithuania0.28703703703703703
                                                        RT_STRING0x4ef880x4a4dataVietnameseVietnam0.28703703703703703
                                                        RT_STRING0x4f42c0x4a4dataBasqueFrance0.28703703703703703
                                                        RT_STRING0x4f42c0x4a4dataBasqueSpain0.28703703703703703
                                                        RT_STRING0x4f8d00x4a4dataChineseChina0.28703703703703703
                                                        RT_STRING0x4fd740x4a4dataPortuguesePortugal0.28703703703703703
                                                        RT_STRING0x502180x4a4data0.28703703703703703
                                                        RT_STRING0x506bc0x2f2dataArabicSaudi Arabia0.42572944297082227
                                                        RT_STRING0x509b00x2f2dataCatalanSpain0.42572944297082227
                                                        RT_STRING0x50ca40x2f2dataChineseTaiwan0.42572944297082227
                                                        RT_STRING0x50f980x2f2dataCzechCzech Republic0.42572944297082227
                                                        RT_STRING0x5128c0x2f2dataDanishDenmark0.42572944297082227
                                                        RT_STRING0x515800x2f2dataGermanGermany0.42572944297082227
                                                        RT_STRING0x518740x2f2dataGreekGreece0.42572944297082227
                                                        RT_STRING0x51b680x2f2dataEnglishUnited States0.42572944297082227
                                                        RT_STRING0x51e5c0x2f2dataFinnishFinland0.42572944297082227
                                                        RT_STRING0x521500x2f2dataFrenchFrance0.42572944297082227
                                                        RT_STRING0x524440x2f2dataHebrewIsrael0.42572944297082227
                                                        RT_STRING0x527380x2f2dataHungarianHungary0.42572944297082227
                                                        RT_STRING0x52a2c0x2f2dataItalianItaly0.42572944297082227
                                                        RT_STRING0x52d200x2f2dataJapaneseJapan0.42572944297082227
                                                        RT_STRING0x530140x2f2dataKoreanNorth Korea0.42572944297082227
                                                        RT_STRING0x530140x2f2dataKoreanSouth Korea0.42572944297082227
                                                        RT_STRING0x533080x2f2dataDutchNetherlands0.42572944297082227
                                                        RT_STRING0x535fc0x2f2dataNorwegianNorway0.42572944297082227
                                                        RT_STRING0x538f00x2f2dataPolishPoland0.42572944297082227
                                                        RT_STRING0x53be40x2f2dataPortugueseBrazil0.42572944297082227
                                                        RT_STRING0x53ed80x2f2dataRomanianRomania0.42572944297082227
                                                        RT_STRING0x541cc0x2f2dataRussianRussia0.42572944297082227
                                                        RT_STRING0x544c00x2f2dataCroatianCroatia0.42572944297082227
                                                        RT_STRING0x547b40x2f2dataSlovakSlovakia0.42572944297082227
                                                        RT_STRING0x54aa80x2f2dataSwedishSweden0.42572944297082227
                                                        RT_STRING0x54d9c0x2f2dataThaiThailand0.42572944297082227
                                                        RT_STRING0x550900x2f2dataTurkishTurkey0.42572944297082227
                                                        RT_STRING0x553840x2f2dataSlovenianSlovenia0.42572944297082227
                                                        RT_STRING0x556780x2f2dataEstonianEstonia0.42572944297082227
                                                        RT_STRING0x5596c0x2f2dataLatvianLativa0.42572944297082227
                                                        RT_STRING0x55c600x2f2dataLithuanianLithuania0.42572944297082227
                                                        RT_STRING0x55f540x2f2dataVietnameseVietnam0.42572944297082227
                                                        RT_STRING0x562480x2f2dataBasqueFrance0.42572944297082227
                                                        RT_STRING0x562480x2f2dataBasqueSpain0.42572944297082227
                                                        RT_STRING0x5653c0x2f2dataChineseChina0.42572944297082227
                                                        RT_STRING0x568300x2f2dataPortuguesePortugal0.42572944297082227
                                                        RT_STRING0x56b240x2f2data0.42572944297082227
                                                        RT_STRING0x56e180x106dataArabicSaudi Arabia0.5076335877862596
                                                        RT_STRING0x56f200x106dataCatalanSpain0.5076335877862596
                                                        RT_STRING0x570280x106dataChineseTaiwan0.5076335877862596
                                                        RT_STRING0x571300x106dataCzechCzech Republic0.5076335877862596
                                                        RT_STRING0x572380x106dataDanishDenmark0.5076335877862596
                                                        RT_STRING0x573400x106dataGermanGermany0.5076335877862596
                                                        RT_STRING0x574480x106dataGreekGreece0.5076335877862596
                                                        RT_STRING0x575500x106dataEnglishUnited States0.5076335877862596
                                                        RT_STRING0x576580x106dataFinnishFinland0.5076335877862596
                                                        RT_STRING0x577600x106dataFrenchFrance0.5076335877862596
                                                        RT_STRING0x578680x106dataHebrewIsrael0.5076335877862596
                                                        RT_STRING0x579700x106dataHungarianHungary0.5076335877862596
                                                        RT_STRING0x57a780x106dataItalianItaly0.5076335877862596
                                                        RT_STRING0x57b800x106dataJapaneseJapan0.5076335877862596
                                                        RT_STRING0x57c880x106dataKoreanNorth Korea0.5076335877862596
                                                        RT_STRING0x57c880x106dataKoreanSouth Korea0.5076335877862596
                                                        RT_STRING0x57d900x106dataDutchNetherlands0.5076335877862596
                                                        RT_STRING0x57e980x106dataNorwegianNorway0.5076335877862596
                                                        RT_STRING0x57fa00x106dataPolishPoland0.5076335877862596
                                                        RT_STRING0x580a80x106dataPortugueseBrazil0.5076335877862596
                                                        RT_STRING0x581b00x106dataRomanianRomania0.5076335877862596
                                                        RT_STRING0x582b80x106dataRussianRussia0.5076335877862596
                                                        RT_STRING0x583c00x106dataCroatianCroatia0.5076335877862596
                                                        RT_STRING0x584c80x106dataSlovakSlovakia0.5076335877862596
                                                        RT_STRING0x585d00x106dataSwedishSweden0.5076335877862596
                                                        RT_STRING0x586d80x106dataThaiThailand0.5076335877862596
                                                        RT_STRING0x587e00x106dataTurkishTurkey0.5076335877862596
                                                        RT_STRING0x588e80x106dataSlovenianSlovenia0.5076335877862596
                                                        RT_STRING0x589f00x106dataEstonianEstonia0.5076335877862596
                                                        RT_STRING0x58af80x106dataLatvianLativa0.5076335877862596
                                                        RT_STRING0x58c000x106dataLithuanianLithuania0.5076335877862596
                                                        RT_STRING0x58d080x106dataVietnameseVietnam0.5076335877862596
                                                        RT_STRING0x58e100x106dataBasqueFrance0.5076335877862596
                                                        RT_STRING0x58e100x106dataBasqueSpain0.5076335877862596
                                                        RT_STRING0x58f180x106dataChineseChina0.5076335877862596
                                                        RT_STRING0x590200x106dataPortuguesePortugal0.5076335877862596
                                                        RT_STRING0x591280x106data0.5076335877862596
                                                        RT_GROUP_ICON0x592300x22dataEnglishUnited States0.9705882352941176
                                                        RT_VERSION0x592540x1084dataEnglishUnited States0.09649952696310313
                                                        RT_MANIFEST0x5a2d80x470XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4507042253521127
                                                        DLLImport
                                                        KERNEL32.dllGetLastError, ResetEvent, CreateEventW, CloseHandle, MultiByteToWideChar, WideCharToMultiByte, FreeLibrary, LoadLibraryW, GetModuleFileNameW, FormatMessageW, LocalFree, GetWindowsDirectoryW, CreateFileW, SetFileTime, SetFileAttributesW, RemoveDirectoryW, CreateDirectoryW, GetFileInformationByHandle, DeleteFileW, GetShortPathNameW, GetFullPathNameW, lstrlenW, GetCurrentDirectoryW, GetTempFileNameW, FindClose, FindFirstFileW, FindNextFileW, GetFileSize, SetFilePointer, ReadFile, WriteFile, SetEndOfFile, DeleteCriticalSection, GetStdHandle, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetCurrentProcessId, InitializeCriticalSection, QueryPerformanceCounter, GetTickCount, Sleep, LocalAlloc, GetProcAddress, SetCurrentDirectoryW, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, SetThreadUILanguage, SetThreadLocale, GetVersion, GetCommandLineW, CreateProcessW, GetExitCodeProcess, FlushFileBuffers, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, LCMapStringW, LCMapStringA, GetStringTypeW, GetStringTypeA, GetConsoleMode, GetConsoleCP, GetLocaleInfoA, IsValidCodePage, GetOEMCP, RaiseException, GetACP, GetCPInfo, LoadLibraryA, RtlUnwind, InitializeCriticalSectionAndSpinCount, GetSystemTimeAsFileTime, WaitForSingleObject, SetEvent, GetVersionExW, VirtualAlloc, GetCurrentThreadId, VirtualFree, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, HeapSize, InterlockedDecrement, SetLastError, InterlockedIncrement, TlsFree, TlsSetValue, TlsAlloc, HeapFree, HeapAlloc, ExitThread, CreateThread, HeapReAlloc, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, GetModuleHandleW, ExitProcess, GetModuleFileNameA, TlsGetValue
                                                        USER32.dllSetForegroundWindow, CharUpperW, GetWindowRect, DestroyWindow, RegisterWindowMessageW, AdjustWindowRect, LoadImageW, LoadIconW, KillTimer, SetTimer, EndDialog, IsDlgButtonChecked, SetDlgItemTextW, GetDlgItem, SetWindowTextW, GetWindowTextW, GetWindowTextLengthW, LoadStringW, DialogBoxParamW, CreateDialogParamW, SystemParametersInfoW, PeekMessageW, GetDesktopWindow, MessageBoxW, SendMessageW, GetWindowLongW, SetWindowLongW, ShowWindow, MoveWindow, PostMessageW
                                                        GDI32.dllGetObjectW
                                                        ADVAPI32.dllRegSetValueExW, RegCreateKeyExW, RegCloseKey
                                                        SHELL32.dllSHGetFolderPathW, ShellExecuteExW
                                                        ole32.dllCoInitializeEx, CoInitialize, CoCreateInstance
                                                        OLEAUT32.dllSysAllocStringLen, SysFreeString, VariantClear, SysAllocString
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        ArabicSaudi Arabia
                                                        CatalanSpain
                                                        ChineseTaiwan
                                                        CzechCzech Republic
                                                        DanishDenmark
                                                        GermanGermany
                                                        GreekGreece
                                                        FinnishFinland
                                                        FrenchFrance
                                                        HebrewIsrael
                                                        HungarianHungary
                                                        ItalianItaly
                                                        JapaneseJapan
                                                        KoreanNorth Korea
                                                        KoreanSouth Korea
                                                        DutchNetherlands
                                                        NorwegianNorway
                                                        PolishPoland
                                                        PortugueseBrazil
                                                        RomanianRomania
                                                        RussianRussia
                                                        CroatianCroatia
                                                        SlovakSlovakia
                                                        SwedishSweden
                                                        ThaiThailand
                                                        TurkishTurkey
                                                        SlovenianSlovenia
                                                        EstonianEstonia
                                                        LatvianLativa
                                                        LithuanianLithuania
                                                        VietnameseVietnam
                                                        ChineseChina
                                                        PortuguesePortugal
                                                        No network behavior found

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:13:17:40
                                                        Start date:25/10/2024
                                                        Path:C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\cfrv_4_0_setup_ALL.exe"
                                                        Imagebase:0x400000
                                                        File size:14'277'760 bytes
                                                        MD5 hash:9197AEADF996DD8CD3885A205927671E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:13:17:50
                                                        Start date:25/10/2024
                                                        Path:C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:.\cfrv_4_0_setup_ALL.exe /m="C:\Users\user\Desktop\CFRV_4~1.EXE" /k=""
                                                        Imagebase:0x400000
                                                        File size:5'675'007 bytes
                                                        MD5 hash:3B2D532673D1567116105D04C621CDBA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Borland Delphi
                                                        Yara matches:
                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000001.00000000.1800908445.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\mia3DCC.tmp\cfrv_4_0_setup_ALL.exe, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 0%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:13:17:58
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\mscomctl.ocx" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:13:17:59
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMDLG32.OCX" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:13:17:59
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\COMCT332.OCX" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:13:17:59
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\SysWOW64\TABCTL32.OCX" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:13:18:00
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Program Files (x86)\Common Files\microsoft shared\DAO\DAO350.DLL" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:13:18:00
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_CR_control.dll" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:13:18:00
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_DB_Connect.dll" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:12
                                                        Start time:13:18:01
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Data.dll" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:13
                                                        Start time:13:18:01
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_File_Export.dll" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:13:18:02
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\regsvr32.exe" "C:\Windows\NCSBOE\CF_Rmt_DB4_Update.dll" /s
                                                        Imagebase:0x800000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:15
                                                        Start time:13:18:03
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\System32\msiexec.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\msiexec.exe /V
                                                        Imagebase:0x7ff7b3810000
                                                        File size:69'632 bytes
                                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:16
                                                        Start time:13:18:03
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 69C5C113DED231894CD03AC8E1DE281B
                                                        Imagebase:0x310000
                                                        File size:59'904 bytes
                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:13:18:11
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\craxdrt.dll"
                                                        Imagebase:0x310000
                                                        File size:59'904 bytes
                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:18
                                                        Start time:13:18:11
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crviewer.dll"
                                                        Imagebase:0x310000
                                                        File size:59'904 bytes
                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:19
                                                        Start time:13:18:11
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\Crystal\Cdo32.dll"
                                                        Imagebase:0x310000
                                                        File size:59'904 bytes
                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:20
                                                        Start time:13:18:11
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\crtslv.dll"
                                                        Imagebase:0x310000
                                                        File size:59'904 bytes
                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:21
                                                        Start time:13:18:11
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\ExportModeller.dll"
                                                        Imagebase:0x310000
                                                        File size:59'904 bytes
                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:23
                                                        Start time:13:18:14
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\explorer.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\explorer.exe" /separate /root,::{21ec2020-3aea-1069-a2dd-08002b30309d}
                                                        Imagebase:0x7ff72b770000
                                                        File size:5'141'208 bytes
                                                        MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:24
                                                        Start time:13:18:14
                                                        Start date:25/10/2024
                                                        Path:C:\Windows\explorer.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                        Imagebase:0x7ff72b770000
                                                        File size:5'141'208 bytes
                                                        MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:11.9%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:12%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:134
                                                          execution_graph 19982 40d740 19983 40d77f 19982->19983 19986 421dee 19983->19986 19985 40d7a3 19988 421dfa __lseeki64 19986->19988 19987 421e73 __dosmaperr __lseeki64 19987->19985 19988->19987 19989 421e39 19988->19989 19999 422f9f 19988->19999 19989->19987 19990 421e4e RtlFreeHeap 19989->19990 19990->19987 19992 421e60 19990->19992 20016 422daa 19992->20016 19995 421e11 ___sbh_find_block 19998 421e2b 19995->19998 20006 423002 19995->20006 20013 421e44 19998->20013 20000 422fc7 EnterCriticalSection 19999->20000 20001 422fb4 19999->20001 20000->19995 20019 422edc 20001->20019 20003 422fba 20003->20000 20045 423cbc 20003->20045 20007 423041 20006->20007 20012 4232e3 20006->20012 20008 42322d VirtualFree 20007->20008 20007->20012 20009 423291 20008->20009 20010 4232a0 VirtualFree HeapFree 20009->20010 20009->20012 20274 4221a0 20010->20274 20012->19998 20278 422ec5 LeaveCriticalSection 20013->20278 20015 421e4b 20015->19989 20279 42446a GetLastError 20016->20279 20018 421e65 GetLastError 20018->19987 20020 422ee8 __lseeki64 20019->20020 20021 422f0e 20020->20021 20052 42416f 20020->20052 20029 422f1e __lseeki64 20021->20029 20098 424ade 20021->20098 20025 422f29 20027 422f30 20025->20027 20028 422f3f 20025->20028 20031 422daa __flsbuf 67 API calls 20027->20031 20032 422f9f __lock 67 API calls 20028->20032 20029->20003 20030 422f04 20095 423d10 20030->20095 20031->20029 20034 422f46 20032->20034 20035 422f7a 20034->20035 20036 422f4e 20034->20036 20037 421dee ___free_lconv_mon 67 API calls 20035->20037 20103 42744e 20036->20103 20044 422f6b 20037->20044 20039 422f59 20041 421dee ___free_lconv_mon 67 API calls 20039->20041 20039->20044 20042 422f65 20041->20042 20043 422daa __flsbuf 67 API calls 20042->20043 20043->20044 20107 422f96 20044->20107 20046 42416f __FF_MSGBANNER 67 API calls 20045->20046 20047 423cc6 20046->20047 20048 423fc4 __NMSG_WRITE 67 API calls 20047->20048 20049 423cce 20048->20049 20050 42425a __decode_pointer 6 API calls 20049->20050 20051 422fc6 20050->20051 20051->20000 20110 427bd3 20052->20110 20054 424176 20056 427bd3 __set_error_mode 67 API calls 20054->20056 20058 424183 20054->20058 20055 423fc4 __NMSG_WRITE 67 API calls 20057 42419b 20055->20057 20056->20058 20059 423fc4 __NMSG_WRITE 67 API calls 20057->20059 20058->20055 20060 422efd 20058->20060 20059->20060 20061 423fc4 20060->20061 20062 423fd8 20061->20062 20063 427bd3 __set_error_mode 64 API calls 20062->20063 20094 424133 20062->20094 20064 423ffa 20063->20064 20065 424138 GetStdHandle 20064->20065 20066 427bd3 __set_error_mode 64 API calls 20064->20066 20067 424146 _strlen 20065->20067 20065->20094 20068 42400b 20066->20068 20070 42415f WriteFile 20067->20070 20067->20094 20068->20065 20069 42401d 20068->20069 20069->20094 20133 427b6b 20069->20133 20070->20094 20073 424053 GetModuleFileNameA 20074 424071 20073->20074 20079 424094 _strlen 20073->20079 20077 427b6b _strcpy_s 64 API calls 20074->20077 20078 424081 20077->20078 20078->20079 20081 424c1e __invoke_watson 10 API calls 20078->20081 20080 4240d7 20079->20080 20149 427a22 20079->20149 20158 4279ae 20080->20158 20081->20079 20085 4240fb 20088 4279ae _strcat_s 64 API calls 20085->20088 20087 424c1e __invoke_watson 10 API calls 20087->20085 20090 42410f 20088->20090 20089 424c1e __invoke_watson 10 API calls 20089->20080 20091 424120 20090->20091 20093 424c1e __invoke_watson 10 API calls 20090->20093 20167 427845 20091->20167 20093->20091 20094->20030 20218 423ce5 GetModuleHandleW 20095->20218 20100 424ae7 20098->20100 20101 424b1d 20100->20101 20102 424afe Sleep 20100->20102 20222 421ecb 20100->20222 20101->20025 20102->20100 20272 423a98 20103->20272 20105 42745a InitializeCriticalSectionAndSpinCount 20106 42749e __lseeki64 20105->20106 20106->20039 20273 422ec5 LeaveCriticalSection 20107->20273 20109 422f9d 20109->20029 20111 427be2 20110->20111 20112 422daa __flsbuf 67 API calls 20111->20112 20113 427bec 20111->20113 20114 427c05 20112->20114 20113->20054 20116 424d46 20114->20116 20119 42425a TlsGetValue 20116->20119 20118 424d56 __invoke_watson 20120 424272 20119->20120 20121 424293 GetModuleHandleW 20119->20121 20120->20121 20122 42427c TlsGetValue 20120->20122 20123 4242a3 20121->20123 20124 4242ae GetProcAddress 20121->20124 20126 424287 20122->20126 20129 423c8c 20123->20129 20128 42428b 20124->20128 20126->20121 20126->20128 20128->20118 20130 423c97 Sleep GetModuleHandleW 20129->20130 20131 423cb5 20130->20131 20132 423cb9 20130->20132 20131->20130 20131->20132 20132->20124 20132->20128 20134 427b83 20133->20134 20135 427b7c 20133->20135 20136 422daa __flsbuf 67 API calls 20134->20136 20135->20134 20138 427ba9 20135->20138 20141 427b88 20136->20141 20137 424d46 __lseeki64 6 API calls 20139 42403f 20137->20139 20138->20139 20140 422daa __flsbuf 67 API calls 20138->20140 20139->20073 20142 424c1e 20139->20142 20140->20141 20141->20137 20194 4287c0 20142->20194 20144 424c4b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20145 424d27 GetCurrentProcess TerminateProcess 20144->20145 20147 424d1b __invoke_watson 20144->20147 20196 421ddf 20145->20196 20147->20145 20148 424050 20148->20073 20153 427a34 20149->20153 20150 427a38 20151 4240c4 20150->20151 20152 422daa __flsbuf 67 API calls 20150->20152 20151->20080 20151->20089 20154 427a54 20152->20154 20153->20150 20153->20151 20156 427a7e 20153->20156 20155 424d46 __lseeki64 6 API calls 20154->20155 20155->20151 20156->20151 20157 422daa __flsbuf 67 API calls 20156->20157 20157->20154 20159 4279c6 20158->20159 20162 4279bf 20158->20162 20160 422daa __flsbuf 67 API calls 20159->20160 20161 4279cb 20160->20161 20163 424d46 __lseeki64 6 API calls 20161->20163 20162->20159 20165 4279fa 20162->20165 20164 4240ea 20163->20164 20164->20085 20164->20087 20165->20164 20166 422daa __flsbuf 67 API calls 20165->20166 20166->20161 20205 424251 20167->20205 20170 427868 LoadLibraryA 20171 42787d GetProcAddress 20170->20171 20183 427992 20170->20183 20173 427893 20171->20173 20171->20183 20172 4278f0 20175 42425a __decode_pointer 6 API calls 20172->20175 20191 42791a 20172->20191 20208 4241df TlsGetValue 20173->20208 20174 42425a __decode_pointer 6 API calls 20184 42795d 20174->20184 20178 42790d 20175->20178 20177 42425a __decode_pointer 6 API calls 20177->20183 20180 42425a __decode_pointer 6 API calls 20178->20180 20180->20191 20181 4241df __encode_pointer 6 API calls 20182 4278ae GetProcAddress 20181->20182 20185 4241df __encode_pointer 6 API calls 20182->20185 20183->20094 20188 42425a __decode_pointer 6 API calls 20184->20188 20190 427945 20184->20190 20186 4278c3 GetProcAddress 20185->20186 20187 4241df __encode_pointer 6 API calls 20186->20187 20189 4278d8 20187->20189 20188->20190 20189->20172 20192 4278e2 GetProcAddress 20189->20192 20190->20177 20191->20174 20191->20190 20193 4241df __encode_pointer 6 API calls 20192->20193 20193->20172 20195 4287cc __VEC_memzero 20194->20195 20195->20144 20197 421de7 20196->20197 20198 421de9 IsDebuggerPresent 20196->20198 20197->20148 20204 427437 20198->20204 20201 422d2f SetUnhandledExceptionFilter UnhandledExceptionFilter 20202 422d54 GetCurrentProcess TerminateProcess 20201->20202 20203 422d4c __invoke_watson 20201->20203 20202->20148 20203->20202 20204->20201 20206 4241df __encode_pointer 6 API calls 20205->20206 20207 424258 20206->20207 20207->20170 20207->20172 20209 4241f7 20208->20209 20210 424218 GetModuleHandleW 20208->20210 20209->20210 20213 424201 TlsGetValue 20209->20213 20211 424233 GetProcAddress 20210->20211 20212 424228 20210->20212 20216 424210 GetProcAddress 20211->20216 20214 423c8c __crt_waiting_on_module_handle 2 API calls 20212->20214 20217 42420c 20213->20217 20215 42422e 20214->20215 20215->20211 20215->20216 20216->20181 20217->20210 20217->20216 20219 423cf9 GetProcAddress 20218->20219 20220 423d0e ExitProcess 20218->20220 20219->20220 20221 423d09 20219->20221 20221->20220 20223 421f7e 20222->20223 20233 421edd 20222->20233 20224 4241b7 __calloc_impl 6 API calls 20223->20224 20225 421f84 20224->20225 20227 422daa __flsbuf 66 API calls 20225->20227 20226 42416f __FF_MSGBANNER 66 API calls 20231 421eee 20226->20231 20239 421f76 20227->20239 20229 423fc4 __NMSG_WRITE 66 API calls 20229->20231 20230 421f3a RtlAllocateHeap 20230->20233 20231->20226 20231->20229 20232 423d10 _fast_error_exit 3 API calls 20231->20232 20231->20233 20232->20231 20233->20230 20233->20231 20234 421f6a 20233->20234 20237 421f6f 20233->20237 20233->20239 20240 421e7c 20233->20240 20248 4241b7 20233->20248 20235 422daa __flsbuf 66 API calls 20234->20235 20235->20237 20238 422daa __flsbuf 66 API calls 20237->20238 20238->20239 20239->20100 20241 421e88 __lseeki64 20240->20241 20242 422f9f __lock 67 API calls 20241->20242 20244 421eb9 __lseeki64 20241->20244 20243 421e9e 20242->20243 20251 4237b1 20243->20251 20244->20233 20249 42425a __decode_pointer 6 API calls 20248->20249 20250 4241c7 20249->20250 20250->20233 20252 4237df 20251->20252 20253 423878 20252->20253 20256 421ea9 20252->20256 20260 423318 20252->20260 20253->20256 20267 4233c8 20253->20267 20257 421ec2 20256->20257 20271 422ec5 LeaveCriticalSection 20257->20271 20259 421ec9 20259->20244 20261 42332b HeapReAlloc 20260->20261 20262 42335f HeapAlloc 20260->20262 20263 423349 20261->20263 20264 42334d 20261->20264 20262->20263 20265 423382 VirtualAlloc 20262->20265 20263->20253 20264->20262 20265->20263 20266 42339c HeapFree 20265->20266 20266->20263 20268 4233df VirtualAlloc 20267->20268 20270 423426 20268->20270 20270->20256 20271->20259 20272->20105 20273->20109 20275 4221b8 20274->20275 20276 4221e7 20275->20276 20277 4221df __VEC_memcpy 20275->20277 20276->20012 20277->20276 20278->20015 20294 4242f5 TlsGetValue 20279->20294 20281 4244d7 SetLastError 20281->20018 20285 42449d 20286 42425a __decode_pointer 6 API calls 20285->20286 20287 4244af 20286->20287 20288 4244b6 20287->20288 20289 4244ce 20287->20289 20305 424383 20288->20305 20291 421dee ___free_lconv_mon 64 API calls 20289->20291 20293 4244d4 20291->20293 20292 4244be GetCurrentThreadId 20292->20281 20293->20281 20295 424325 20294->20295 20296 42430a 20294->20296 20295->20281 20299 424b23 20295->20299 20297 42425a __decode_pointer 6 API calls 20296->20297 20298 424315 TlsSetValue 20297->20298 20298->20295 20300 424b2c 20299->20300 20302 424495 20300->20302 20303 424b4a Sleep 20300->20303 20324 428626 20300->20324 20302->20281 20302->20285 20304 424b5f 20303->20304 20304->20300 20304->20302 20341 423a98 20305->20341 20307 42438f GetModuleHandleW 20308 4243a6 20307->20308 20309 42439f 20307->20309 20311 4243e1 20308->20311 20312 4243bd GetProcAddress GetProcAddress 20308->20312 20310 423c8c __crt_waiting_on_module_handle 2 API calls 20309->20310 20314 4243a5 20310->20314 20313 422f9f __lock 63 API calls 20311->20313 20312->20311 20315 424400 InterlockedIncrement 20313->20315 20314->20308 20342 424458 20315->20342 20318 422f9f __lock 63 API calls 20319 424421 20318->20319 20345 427d67 InterlockedIncrement 20319->20345 20321 42443f 20357 424461 20321->20357 20323 42444c __lseeki64 20323->20292 20325 428632 __lseeki64 20324->20325 20326 42864a 20325->20326 20336 428669 _memset 20325->20336 20327 422daa __flsbuf 66 API calls 20326->20327 20328 42864f 20327->20328 20329 424d46 __lseeki64 6 API calls 20328->20329 20331 42865f __lseeki64 20329->20331 20330 4286db HeapAlloc 20330->20336 20331->20300 20332 4241b7 __calloc_impl 6 API calls 20332->20336 20333 422f9f __lock 66 API calls 20333->20336 20334 4237b1 ___sbh_alloc_block 5 API calls 20334->20336 20336->20330 20336->20331 20336->20332 20336->20333 20336->20334 20337 428722 20336->20337 20340 422ec5 LeaveCriticalSection 20337->20340 20339 428729 20339->20336 20340->20339 20341->20307 20360 422ec5 LeaveCriticalSection 20342->20360 20344 42441a 20344->20318 20346 427d85 InterlockedIncrement 20345->20346 20347 427d88 20345->20347 20346->20347 20348 427d92 InterlockedIncrement 20347->20348 20349 427d95 20347->20349 20348->20349 20350 427da2 20349->20350 20351 427d9f InterlockedIncrement 20349->20351 20352 427daf 20350->20352 20353 427dac InterlockedIncrement 20350->20353 20351->20350 20354 427dc8 InterlockedIncrement 20352->20354 20355 427de3 InterlockedIncrement 20352->20355 20356 427dd8 InterlockedIncrement 20352->20356 20353->20352 20354->20352 20355->20321 20356->20352 20361 422ec5 LeaveCriticalSection 20357->20361 20359 424468 20359->20323 20360->20344 20361->20359 20362 413d40 20363 413d50 WriteFile 20362->20363 20364 413d4b 20362->20364 20365 413d8d 20363->20365 20364->20363 20366 413d93 20365->20366 20367 413d98 GetLastError 20365->20367 20368 413da2 20367->20368 20369 41e040 20372 41df90 20369->20372 20371 41e04a 20377 41dd70 20372->20377 20375 41dfea PostMessageW 20375->20371 20376 41e00f 20376->20371 20378 41ddb0 20377->20378 20379 41ddaa 20377->20379 20384 41df74 WaitForSingleObject 20378->20384 20437 41b1d0 20378->20437 20397 41db40 20379->20397 20384->20375 20384->20376 20385 41df27 20386 421dee ___free_lconv_mon 67 API calls 20385->20386 20386->20384 20387 41ddda 20387->20385 20389 421dee 67 API calls ___free_lconv_mon 20387->20389 20390 404b30 68 API calls 20387->20390 20392 41df29 20387->20392 20445 406230 20387->20445 20456 404920 20387->20456 20460 408890 20387->20460 20389->20387 20390->20387 20394 404920 67 API calls 20392->20394 20395 41df38 20394->20395 20396 408890 VariantClear 20395->20396 20396->20385 20464 404e70 20397->20464 20402 41dbc5 20480 41abf0 20402->20480 20403 41db9f 20476 404bf0 20403->20476 20407 421dee ___free_lconv_mon 67 API calls 20408 41dd50 20407->20408 20408->20378 20409 421dee ___free_lconv_mon 67 API calls 20410 41dc34 20409->20410 20411 41dc5b 20410->20411 20412 41dc3c 20410->20412 20541 404b90 20411->20541 20414 404bf0 68 API calls 20412->20414 20416 41dbac 20414->20416 20416->20407 20420 41dc7e 20421 41dc82 20420->20421 20422 41dcde 20420->20422 20598 41b320 20421->20598 20605 404b30 20422->20605 21465 4089e0 20437->21465 20440 405140 20441 405150 20440->20441 20442 405171 CharUpperW CharUpperW 20441->20442 20443 40518f 20441->20443 20442->20441 20444 405198 20442->20444 20443->20387 20444->20387 20446 40626a 20445->20446 20447 404e70 68 API calls 20446->20447 20451 406281 20447->20451 20448 40628c 20450 421dee ___free_lconv_mon 67 API calls 20448->20450 20449 4062e2 20452 4049b0 68 API calls 20449->20452 20453 406300 20450->20453 20451->20448 20451->20449 20454 4049b0 68 API calls 20451->20454 20455 404c40 68 API calls 20451->20455 20452->20448 20453->20387 20454->20451 20455->20451 20457 40495f 20456->20457 20458 421dee ___free_lconv_mon 67 API calls 20457->20458 20459 404983 20458->20459 20459->20387 20461 4088b5 VariantClear 20460->20461 20462 40889b 20460->20462 20461->20387 20462->20461 20463 4088a9 20462->20463 20463->20387 20465 421ecb _malloc 67 API calls 20464->20465 20466 404e8e 20465->20466 20469 404eac 20466->20469 20664 42d9e5 20466->20664 20468 404ed8 20471 407f40 20468->20471 20469->20468 20469->20469 20470 421dee ___free_lconv_mon 67 API calls 20469->20470 20470->20468 20667 407e20 20471->20667 20474 407f94 20474->20402 20474->20403 20475 407f8d FindClose 20475->20474 20477 404bf7 20476->20477 20478 404c14 20476->20478 20477->20478 20479 404e70 68 API calls 20477->20479 20478->20416 20479->20478 20481 421ecb _malloc 67 API calls 20480->20481 20482 41ac2d 20481->20482 20483 41ac47 20482->20483 20484 42d9e5 __CxxThrowException@8 RaiseException 20482->20484 20742 4197d0 20483->20742 20484->20483 20487 404e70 68 API calls 20488 41ac95 20487->20488 20489 404e70 68 API calls 20488->20489 20490 41acb1 20489->20490 20491 404e70 68 API calls 20490->20491 20492 41accd 20491->20492 20749 4077c0 20492->20749 20494 41ace7 20495 41aceb GetLastError 20494->20495 20496 41ad3d 20494->20496 20498 421dee ___free_lconv_mon 67 API calls 20495->20498 20764 404df0 20496->20764 20500 41ad02 20498->20500 20502 421dee ___free_lconv_mon 67 API calls 20500->20502 20501 404bf0 68 API calls 20503 41ad5e 20501->20503 20504 41ad14 20502->20504 20505 421dee ___free_lconv_mon 67 API calls 20503->20505 20506 421dee ___free_lconv_mon 67 API calls 20504->20506 20507 41ad6d 20505->20507 20539 41ad26 20506->20539 20767 404cb0 20507->20767 20510 404bf0 68 API calls 20511 41ad91 20510->20511 20512 421dee ___free_lconv_mon 67 API calls 20511->20512 20513 41ada0 20512->20513 20770 4198b0 20513->20770 20539->20409 20542 404bb5 20541->20542 20543 404baf 20541->20543 20545 408700 20542->20545 20544 404e70 68 API calls 20543->20544 20544->20542 20546 408738 20545->20546 20547 408708 20545->20547 20549 406c90 20546->20549 20547->20546 20548 404c40 68 API calls 20547->20548 20548->20546 20550 404b30 68 API calls 20549->20550 20556 406cc2 20550->20556 20551 406d40 20552 404b90 68 API calls 20551->20552 20553 406d56 20552->20553 21432 406bc0 CreateDirectoryW 20553->21432 20555 406d66 20558 406d70 GetLastError 20555->20558 20579 404df0 68 API calls 20555->20579 20590 406f44 20555->20590 20592 421dee ___free_lconv_mon 67 API calls 20555->20592 20593 404e70 68 API calls 20555->20593 20596 406bc0 72 API calls 20555->20596 20597 406ef8 20555->20597 20556->20551 20557 4221a0 ___sbh_free_block __VEC_memcpy 20556->20557 20591 406ead 20556->20591 20557->20551 20558->20555 20561 406e55 20558->20561 20559 404bf0 68 API calls 20560 421dee ___free_lconv_mon 67 API calls 20562 406ec1 20560->20562 20563 404e70 68 API calls 20561->20563 20562->20420 20568 421dee ___free_lconv_mon 67 API calls 20572 406f0d 20568->20572 20579->20555 20590->20559 20591->20560 20592->20555 20593->20555 20596->20555 20597->20568 20599 41b1d0 69 API calls 20598->20599 20600 41b359 20599->20600 20606 404b4f 20605->20606 20607 404e70 68 API calls 20606->20607 20608 404b65 20606->20608 20607->20608 20609 41c520 20608->20609 20665 42da1a RaiseException 20664->20665 20666 42da0e 20664->20666 20665->20469 20666->20665 20668 407e84 FindFirstFileW 20667->20668 20669 407e6f FindClose 20667->20669 20671 407e97 20668->20671 20672 407ef7 20668->20672 20670 407e7e 20669->20670 20674 407f0c 20669->20674 20670->20668 20675 404e70 68 API calls 20671->20675 20672->20674 20712 407dc0 20672->20712 20676 421ddf ___ansicp 5 API calls 20674->20676 20677 407eb0 20675->20677 20679 407f2d 20676->20679 20684 4081c0 20677->20684 20679->20474 20679->20475 20681 407ee6 20683 421dee ___free_lconv_mon 67 API calls 20681->20683 20682 407ed8 FindFirstFileW 20682->20681 20683->20672 20685 408206 20684->20685 20686 404e70 68 API calls 20685->20686 20697 407ec4 20685->20697 20688 408259 20686->20688 20687 4082a9 GetCurrentDirectoryW 20689 4082c4 20687->20689 20688->20687 20690 404e70 68 API calls 20688->20690 20691 4082f1 20688->20691 20692 408391 20689->20692 20695 4082d8 20689->20695 20690->20687 20693 404b30 68 API calls 20691->20693 20694 421dee ___free_lconv_mon 67 API calls 20692->20694 20696 4082ff 20693->20696 20694->20697 20695->20691 20716 404c40 20695->20716 20720 407ca0 20696->20720 20697->20681 20697->20682 20703 404bf0 68 API calls 20704 408338 20703->20704 20705 421dee ___free_lconv_mon 67 API calls 20704->20705 20706 408346 20705->20706 20707 421dee ___free_lconv_mon 67 API calls 20706->20707 20708 408355 20707->20708 20709 421dee ___free_lconv_mon 67 API calls 20708->20709 20710 408364 20709->20710 20711 421dee ___free_lconv_mon 67 API calls 20710->20711 20711->20697 20713 407df9 __winput_l 20712->20713 20738 4067a0 20713->20738 20715 407e15 20715->20674 20717 404c8c 20716->20717 20718 404c52 20716->20718 20717->20691 20718->20717 20719 404e70 68 API calls 20718->20719 20719->20717 20721 404b90 68 API calls 20720->20721 20722 407cdd 20721->20722 20730 406370 20722->20730 20725 408600 20726 404b90 68 API calls 20725->20726 20727 40863d 20726->20727 20734 408670 20727->20734 20731 4063c0 20730->20731 20732 40638a 20730->20732 20731->20725 20732->20731 20733 404e70 68 API calls 20732->20733 20733->20731 20736 408682 20734->20736 20735 408328 20735->20703 20736->20735 20737 404e70 68 API calls 20736->20737 20737->20735 20739 4067b9 20738->20739 20740 404e70 68 API calls 20739->20740 20741 4067d5 20739->20741 20740->20741 20741->20715 20741->20741 20743 404e70 68 API calls 20742->20743 20744 41983e 20743->20744 20745 404e70 68 API calls 20744->20745 20746 419854 20745->20746 20747 404e70 68 API calls 20746->20747 20748 41986b 20747->20748 20748->20487 20750 4077e1 20749->20750 20751 4077f2 GetFullPathNameW 20749->20751 20750->20751 20753 404e70 68 API calls 20750->20753 20752 407815 20751->20752 20754 40782e 20752->20754 20757 407856 GetFullPathNameW 20752->20757 20760 407871 20752->20760 20763 404e70 68 API calls 20752->20763 20753->20751 20754->20494 20755 4078b9 20759 407620 70 API calls 20755->20759 20756 40789a lstrlenW 20836 407620 20756->20836 20757->20760 20762 4078cb 20759->20762 20760->20754 20760->20755 20760->20756 20762->20494 20763->20757 20858 404cd0 20764->20858 20768 404cd0 68 API calls 20767->20768 20769 404cc6 20768->20769 20769->20510 20771 404bf0 68 API calls 20770->20771 20772 4198e1 20771->20772 20773 407ca0 68 API calls 20772->20773 20774 4198f2 20773->20774 20775 407f40 73 API calls 20774->20775 20776 419905 20775->20776 20838 407655 20836->20838 20837 40779b 20837->20494 20838->20837 20854 407580 20838->20854 20840 407697 20841 407580 68 API calls 20840->20841 20842 4076a6 20841->20842 20843 4076d7 20842->20843 20844 404df0 68 API calls 20842->20844 20847 421dee ___free_lconv_mon 67 API calls 20843->20847 20850 4076f6 20843->20850 20845 4076c2 20844->20845 20846 405140 2 API calls 20845->20846 20846->20843 20847->20850 20848 407700 20849 421dee ___free_lconv_mon 67 API calls 20848->20849 20851 407789 20849->20851 20850->20848 20853 404e70 68 API calls 20850->20853 20852 421dee ___free_lconv_mon 67 API calls 20851->20852 20852->20837 20853->20850 20855 407593 20854->20855 20856 404e70 68 API calls 20855->20856 20857 4075fa 20855->20857 20856->20857 20857->20840 20857->20857 20859 404d11 20858->20859 20860 404d2f 20859->20860 20861 404d1d 20859->20861 20862 404e70 68 API calls 20860->20862 20863 404b90 68 API calls 20861->20863 20864 404d46 20862->20864 20865 404d2a 20863->20865 20866 404d59 20864->20866 20867 404e70 68 API calls 20864->20867 20865->20501 20868 404da8 20866->20868 20869 404e70 68 API calls 20866->20869 20867->20866 20870 421dee ___free_lconv_mon 67 API calls 20868->20870 20869->20868 20870->20865 21433 406bfb 21432->21433 21434 406bff GetLastError 21432->21434 21433->20555 21434->21433 21435 406c0c 21434->21435 21436 404e70 68 API calls 21435->21436 21437 406c23 21436->21437 21468 408910 21465->21468 21469 404e70 68 API calls 21468->21469 21471 408958 21469->21471 21470 408989 LoadStringW 21470->21471 21473 40899e 21470->21473 21471->21470 21472 404e70 68 API calls 21471->21472 21472->21470 21473->20440 21474 416680 21479 4166d0 21474->21479 21477 416695 21478 421dee ___free_lconv_mon 67 API calls 21478->21477 21480 416738 21479->21480 21481 421dee ___free_lconv_mon 67 API calls 21480->21481 21482 416688 21481->21482 21482->21477 21482->21478 21483 4166c4 21484 421dee ___free_lconv_mon 67 API calls 21483->21484 21485 4166ca 21484->21485 21486 422b09 21487 422b1a 21486->21487 21523 422df3 HeapCreate 21487->21523 21490 422b59 21525 42469a GetModuleHandleW 21490->21525 21494 422b6a __RTC_Initialize 21559 427101 21494->21559 21495 422ab1 _fast_error_exit 67 API calls 21495->21494 21497 422b78 21498 422b84 GetCommandLineA 21497->21498 21500 423cbc __amsg_exit 67 API calls 21497->21500 21574 426fca 21498->21574 21502 422b83 21500->21502 21502->21498 21505 422ba9 21613 426c97 21505->21613 21506 423cbc __amsg_exit 67 API calls 21506->21505 21509 422bba 21628 423d7b 21509->21628 21510 423cbc __amsg_exit 67 API calls 21510->21509 21512 422bc1 21513 422bcc 21512->21513 21514 423cbc __amsg_exit 67 API calls 21512->21514 21634 426c38 21513->21634 21514->21513 21518 422bed 21519 422bfb 21518->21519 22382 423f2c 21518->22382 22393 423f58 21519->22393 21524 422b4d 21523->21524 21524->21490 22385 422ab1 21524->22385 21526 4246b5 21525->21526 21527 4246ae 21525->21527 21529 4246bf GetProcAddress GetProcAddress GetProcAddress GetProcAddress 21526->21529 21530 42481d 21526->21530 21528 423c8c __crt_waiting_on_module_handle 2 API calls 21527->21528 21532 4246b4 21528->21532 21533 424708 TlsAlloc 21529->21533 22407 424346 21530->22407 21532->21526 21535 422b5f 21533->21535 21536 424756 TlsSetValue 21533->21536 21535->21494 21535->21495 21536->21535 21537 424767 21536->21537 22396 423f76 21537->22396 21540 4241df __encode_pointer 6 API calls 21541 424777 21540->21541 21542 4241df __encode_pointer 6 API calls 21541->21542 21543 424787 21542->21543 21544 4241df __encode_pointer 6 API calls 21543->21544 21545 424797 21544->21545 21546 4241df __encode_pointer 6 API calls 21545->21546 21547 4247a7 21546->21547 22403 422e23 21547->22403 21550 42425a __decode_pointer 6 API calls 21551 4247c8 21550->21551 21551->21530 21552 424b23 __calloc_crt 67 API calls 21551->21552 21553 4247e1 21552->21553 21553->21530 21554 42425a __decode_pointer 6 API calls 21553->21554 21555 4247fb 21554->21555 21555->21530 21556 424802 21555->21556 21557 424383 __initptd 67 API calls 21556->21557 21558 42480a GetCurrentThreadId 21557->21558 21558->21535 22416 423a98 21559->22416 21561 42710d GetStartupInfoA 21562 424b23 __calloc_crt 67 API calls 21561->21562 21569 42712e 21562->21569 21563 42734c __lseeki64 21563->21497 21564 4272c9 GetStdHandle 21568 427293 21564->21568 21565 42732e SetHandleCount 21565->21563 21566 424b23 __calloc_crt 67 API calls 21566->21569 21567 4272db GetFileType 21567->21568 21568->21563 21568->21564 21568->21565 21568->21567 21570 42744e __ioinit InitializeCriticalSectionAndSpinCount 21568->21570 21569->21563 21569->21566 21569->21568 21571 427216 21569->21571 21570->21568 21571->21563 21571->21568 21572 42723f GetFileType 21571->21572 21573 42744e __ioinit InitializeCriticalSectionAndSpinCount 21571->21573 21572->21571 21573->21571 21575 427007 21574->21575 21576 426fe8 GetEnvironmentStringsW 21574->21576 21577 426ff0 21575->21577 21579 4270a0 21575->21579 21576->21577 21578 426ffc GetLastError 21576->21578 21581 427032 WideCharToMultiByte 21577->21581 21582 427023 GetEnvironmentStringsW 21577->21582 21578->21575 21580 4270a9 GetEnvironmentStrings 21579->21580 21583 422b94 21579->21583 21580->21583 21589 4270b9 21580->21589 21586 427066 21581->21586 21587 427095 FreeEnvironmentStringsW 21581->21587 21582->21581 21582->21583 21600 426f0f 21583->21600 21588 424ade __malloc_crt 67 API calls 21586->21588 21587->21583 21592 42706c 21588->21592 21590 424ade __malloc_crt 67 API calls 21589->21590 21591 4270d3 21590->21591 21593 4270e6 ___crtGetEnvironmentStringsA 21591->21593 21594 4270da FreeEnvironmentStringsA 21591->21594 21592->21587 21595 427074 WideCharToMultiByte 21592->21595 21598 4270f0 FreeEnvironmentStringsA 21593->21598 21594->21583 21596 42708e 21595->21596 21597 427086 21595->21597 21596->21587 21599 421dee ___free_lconv_mon 67 API calls 21597->21599 21598->21583 21599->21596 21601 426f24 21600->21601 21602 426f29 GetModuleFileNameA 21600->21602 22423 428608 21601->22423 21604 426f50 21602->21604 22417 426d75 21604->22417 21607 422b9e 21607->21505 21607->21506 21608 426f8c 21609 424ade __malloc_crt 67 API calls 21608->21609 21610 426f92 21609->21610 21610->21607 21611 426d75 _parse_cmdline 77 API calls 21610->21611 21612 426fac 21611->21612 21612->21607 21614 426ca0 21613->21614 21615 426ca5 _strlen 21613->21615 21616 428608 ___initmbctable 111 API calls 21614->21616 21617 422baf 21615->21617 21618 424b23 __calloc_crt 67 API calls 21615->21618 21616->21615 21617->21509 21617->21510 21625 426cda _strlen 21618->21625 21619 426d38 21620 421dee ___free_lconv_mon 67 API calls 21619->21620 21620->21617 21621 424b23 __calloc_crt 67 API calls 21621->21625 21622 426d5e 21623 421dee ___free_lconv_mon 67 API calls 21622->21623 21623->21617 21624 427b6b _strcpy_s 67 API calls 21624->21625 21625->21617 21625->21619 21625->21621 21625->21622 21625->21624 21626 426d1f 21625->21626 21626->21625 21627 424c1e __invoke_watson 10 API calls 21626->21627 21627->21626 21629 423d89 __IsNonwritableInCurrentImage 21628->21629 22834 427603 21629->22834 21631 423da7 __initterm_e 21633 423dc6 __IsNonwritableInCurrentImage __initterm 21631->21633 22838 42262c 21631->22838 21633->21512 21635 426c46 21634->21635 21638 426c4b 21634->21638 21636 428608 ___initmbctable 111 API calls 21635->21636 21636->21638 21637 422bd2 21640 41ff60 LoadLibraryW 21637->21640 21638->21637 21639 42af37 __wincmdln 77 API calls 21638->21639 21639->21638 21641 41ffe2 21640->21641 21642 41ff9b GetProcAddress 21640->21642 22938 41ea10 GetVersionExW 21641->22938 21644 41ffcb GetProcAddress 21642->21644 21645 41ffad 21642->21645 21647 41ffd7 21644->21647 21648 41ffdb FreeLibrary 21644->21648 21645->21644 21652 41ffb8 GetProcAddress 21645->21652 21646 41fff1 21649 41fff5 21646->21649 21650 420044 CoInitialize 21646->21650 21647->21648 21648->21641 21651 41b1d0 69 API calls 21649->21651 21653 42005e _memset 21650->21653 21654 420009 MessageBoxW 21651->21654 21652->21644 21655 41ffc4 21652->21655 22946 41f320 GetVersion 21653->22946 21656 421dee ___free_lconv_mon 67 API calls 21654->21656 21655->21644 21658 420025 21656->21658 21662 421ddf ___ansicp 5 API calls 21658->21662 21660 420090 21661 4200aa 21660->21661 21663 420099 21660->21663 21664 4200b4 21661->21664 22949 41f6e0 21661->22949 21665 42003e 21662->21665 23211 41f630 21663->23211 21668 404e70 68 API calls 21664->21668 21665->21518 21670 4200e0 21668->21670 21671 404e70 68 API calls 21670->21671 21672 4200f7 21671->21672 21673 404e70 68 API calls 21672->21673 24321 423e00 22382->24321 22386 422ac4 22385->22386 22387 422abf 22385->22387 22389 423fc4 __NMSG_WRITE 67 API calls 22386->22389 22388 42416f __FF_MSGBANNER 67 API calls 22387->22388 22388->22386 22390 422acc 22389->22390 22391 423d10 _fast_error_exit 3 API calls 22390->22391 22392 422ad6 22391->22392 22392->21490 22394 423e00 _doexit 67 API calls 22393->22394 22397 424251 ___crtMessageBoxW 6 API calls 22396->22397 22398 423f7e __init_pointers __initp_misc_winsig 22397->22398 22413 424df0 22398->22413 22401 4241df __encode_pointer 6 API calls 22402 423fba 22401->22402 22402->21540 22404 422e2e 22403->22404 22405 42744e __ioinit InitializeCriticalSectionAndSpinCount 22404->22405 22406 422e5c 22404->22406 22405->22404 22406->21530 22406->21550 22408 424350 22407->22408 22412 42435c 22407->22412 22409 42425a __decode_pointer 6 API calls 22408->22409 22409->22412 22410 424370 TlsFree 22411 42437e 22410->22411 22411->22411 22412->22410 22412->22411 22414 4241df __encode_pointer 6 API calls 22413->22414 22415 423fb0 22414->22415 22415->22401 22416->21561 22419 426d94 22417->22419 22421 426e01 22419->22421 22427 42af37 22419->22427 22420 426eff 22420->21607 22420->21608 22421->22420 22422 42af37 77 API calls __wincmdln 22421->22422 22422->22421 22424 428618 22423->22424 22425 428611 22423->22425 22424->21602 22649 42846e 22425->22649 22430 42aee4 22427->22430 22433 4257e9 22430->22433 22434 4257fc 22433->22434 22438 425849 22433->22438 22441 4244e3 22434->22441 22437 425829 22437->22438 22461 428169 22437->22461 22438->22419 22442 42446a __getptd_noexit 67 API calls 22441->22442 22443 4244eb 22442->22443 22444 4244f8 22443->22444 22445 423cbc __amsg_exit 67 API calls 22443->22445 22444->22437 22446 427ecd 22444->22446 22445->22444 22447 427ed9 __lseeki64 22446->22447 22448 4244e3 __getptd 67 API calls 22447->22448 22449 427ede 22448->22449 22450 427f0c 22449->22450 22451 427ef0 22449->22451 22452 422f9f __lock 67 API calls 22450->22452 22453 4244e3 __getptd 67 API calls 22451->22453 22454 427f13 22452->22454 22455 427ef5 22453->22455 22477 427e8f 22454->22477 22459 427f03 __lseeki64 22455->22459 22460 423cbc __amsg_exit 67 API calls 22455->22460 22459->22437 22460->22459 22462 428175 __lseeki64 22461->22462 22463 4244e3 __getptd 67 API calls 22462->22463 22464 42817a 22463->22464 22465 42818c 22464->22465 22466 422f9f __lock 67 API calls 22464->22466 22468 42819a __lseeki64 22465->22468 22470 423cbc __amsg_exit 67 API calls 22465->22470 22467 4281aa 22466->22467 22469 4281f3 22467->22469 22472 4281c1 InterlockedDecrement 22467->22472 22473 4281db InterlockedIncrement 22467->22473 22468->22438 22645 428204 22469->22645 22470->22468 22472->22473 22474 4281cc 22472->22474 22473->22469 22474->22473 22475 421dee ___free_lconv_mon 67 API calls 22474->22475 22476 4281da 22475->22476 22476->22473 22478 427e93 22477->22478 22479 427ec5 22477->22479 22478->22479 22480 427d67 ___addlocaleref 8 API calls 22478->22480 22485 427f37 22479->22485 22481 427ea6 22480->22481 22481->22479 22488 427df6 22481->22488 22644 422ec5 LeaveCriticalSection 22485->22644 22487 427f3e 22487->22455 22489 427e07 InterlockedDecrement 22488->22489 22490 427e8a 22488->22490 22491 427e1f 22489->22491 22492 427e1c InterlockedDecrement 22489->22492 22490->22479 22502 427c1e 22490->22502 22493 427e29 InterlockedDecrement 22491->22493 22494 427e2c 22491->22494 22492->22491 22493->22494 22495 427e36 InterlockedDecrement 22494->22495 22496 427e39 22494->22496 22495->22496 22497 427e43 InterlockedDecrement 22496->22497 22498 427e46 22496->22498 22497->22498 22499 427e5f InterlockedDecrement 22498->22499 22500 427e7a InterlockedDecrement 22498->22500 22501 427e6f InterlockedDecrement 22498->22501 22499->22498 22500->22490 22501->22498 22503 427ca2 22502->22503 22504 427c35 22502->22504 22505 427cef 22503->22505 22506 421dee ___free_lconv_mon 67 API calls 22503->22506 22504->22503 22514 421dee ___free_lconv_mon 67 API calls 22504->22514 22530 427c69 22504->22530 22521 427d16 22505->22521 22556 42b090 22505->22556 22508 427cc3 22506->22508 22509 421dee ___free_lconv_mon 67 API calls 22508->22509 22511 427cd6 22509->22511 22517 421dee ___free_lconv_mon 67 API calls 22511->22517 22512 421dee ___free_lconv_mon 67 API calls 22518 427c97 22512->22518 22513 427d5b 22519 421dee ___free_lconv_mon 67 API calls 22513->22519 22520 427c5e 22514->22520 22515 421dee ___free_lconv_mon 67 API calls 22515->22521 22516 421dee ___free_lconv_mon 67 API calls 22522 427c7f 22516->22522 22523 427ce4 22517->22523 22525 421dee ___free_lconv_mon 67 API calls 22518->22525 22526 427d61 22519->22526 22532 42b26a 22520->22532 22521->22513 22524 421dee 67 API calls ___free_lconv_mon 22521->22524 22548 42b225 22522->22548 22529 421dee ___free_lconv_mon 67 API calls 22523->22529 22524->22521 22525->22503 22526->22479 22529->22505 22530->22516 22531 427c8a 22530->22531 22531->22512 22533 42b277 22532->22533 22547 42b2f4 22532->22547 22534 42b288 22533->22534 22535 421dee ___free_lconv_mon 67 API calls 22533->22535 22536 42b29a 22534->22536 22537 421dee ___free_lconv_mon 67 API calls 22534->22537 22535->22534 22538 42b2ac 22536->22538 22539 421dee ___free_lconv_mon 67 API calls 22536->22539 22537->22536 22540 42b2be 22538->22540 22541 421dee ___free_lconv_mon 67 API calls 22538->22541 22539->22538 22542 421dee ___free_lconv_mon 67 API calls 22540->22542 22544 42b2d0 22540->22544 22541->22540 22542->22544 22543 42b2e2 22546 421dee ___free_lconv_mon 67 API calls 22543->22546 22543->22547 22544->22543 22545 421dee ___free_lconv_mon 67 API calls 22544->22545 22545->22543 22546->22547 22547->22530 22549 42b232 22548->22549 22550 42b266 22548->22550 22551 42b242 22549->22551 22552 421dee ___free_lconv_mon 67 API calls 22549->22552 22550->22531 22553 42b254 22551->22553 22554 421dee ___free_lconv_mon 67 API calls 22551->22554 22552->22551 22553->22550 22555 421dee ___free_lconv_mon 67 API calls 22553->22555 22554->22553 22555->22550 22557 42b0a1 22556->22557 22643 427d0f 22556->22643 22558 421dee ___free_lconv_mon 67 API calls 22557->22558 22559 42b0a9 22558->22559 22560 421dee ___free_lconv_mon 67 API calls 22559->22560 22561 42b0b1 22560->22561 22562 421dee ___free_lconv_mon 67 API calls 22561->22562 22563 42b0b9 22562->22563 22564 421dee ___free_lconv_mon 67 API calls 22563->22564 22565 42b0c1 22564->22565 22566 421dee ___free_lconv_mon 67 API calls 22565->22566 22567 42b0c9 22566->22567 22568 421dee ___free_lconv_mon 67 API calls 22567->22568 22569 42b0d1 22568->22569 22643->22515 22644->22487 22648 422ec5 LeaveCriticalSection 22645->22648 22647 42820b 22647->22465 22648->22647 22650 42847a __lseeki64 22649->22650 22651 4244e3 __getptd 67 API calls 22650->22651 22652 428483 22651->22652 22653 428169 _LocaleUpdate::_LocaleUpdate 69 API calls 22652->22653 22654 42848d 22653->22654 22680 42820d 22654->22680 22657 424ade __malloc_crt 67 API calls 22658 4284ae 22657->22658 22672 4285cd __lseeki64 22658->22672 22687 428289 22658->22687 22661 4285da 22666 4285ed 22661->22666 22667 421dee ___free_lconv_mon 67 API calls 22661->22667 22661->22672 22662 4284de InterlockedDecrement 22663 4284ee 22662->22663 22664 4284ff InterlockedIncrement 22662->22664 22663->22664 22669 421dee ___free_lconv_mon 67 API calls 22663->22669 22665 428515 22664->22665 22664->22672 22671 422f9f __lock 67 API calls 22665->22671 22665->22672 22668 422daa __flsbuf 67 API calls 22666->22668 22667->22666 22668->22672 22670 4284fe 22669->22670 22670->22664 22674 428529 InterlockedDecrement 22671->22674 22672->22424 22675 4285a5 22674->22675 22676 4285b8 InterlockedIncrement 22674->22676 22675->22676 22678 421dee ___free_lconv_mon 67 API calls 22675->22678 22697 4285cf 22676->22697 22679 4285b7 22678->22679 22679->22676 22681 4257e9 _LocaleUpdate::_LocaleUpdate 77 API calls 22680->22681 22682 428221 22681->22682 22683 42824a 22682->22683 22684 42822c GetOEMCP 22682->22684 22685 42824f GetACP 22683->22685 22686 42823c 22683->22686 22684->22686 22685->22686 22686->22657 22686->22672 22688 42820d getSystemCP 79 API calls 22687->22688 22689 4282a9 22688->22689 22690 4282b4 setSBCS 22689->22690 22693 4282f8 IsValidCodePage 22689->22693 22696 42831d _memset __setmbcp_nolock 22689->22696 22691 421ddf ___ansicp 5 API calls 22690->22691 22692 42846c 22691->22692 22692->22661 22692->22662 22693->22690 22694 42830a GetCPInfo 22693->22694 22694->22690 22694->22696 22700 427fd6 GetCPInfo 22696->22700 22833 422ec5 LeaveCriticalSection 22697->22833 22699 4285d6 22699->22672 22702 42800a _memset 22700->22702 22709 4280bc 22700->22709 22710 42b500 22702->22710 22705 421ddf ___ansicp 5 API calls 22707 428167 22705->22707 22707->22696 22708 42b935 ___crtLCMapStringA 102 API calls 22708->22709 22709->22705 22711 4257e9 _LocaleUpdate::_LocaleUpdate 77 API calls 22710->22711 22712 42b513 22711->22712 22720 42b346 22712->22720 22715 42b935 22716 4257e9 _LocaleUpdate::_LocaleUpdate 77 API calls 22715->22716 22717 42b948 22716->22717 22786 42b590 22717->22786 22721 42b367 GetStringTypeW 22720->22721 22723 42b392 22720->22723 22722 42b387 GetLastError 22721->22722 22724 42b37f 22721->22724 22722->22723 22723->22724 22726 42b479 22723->22726 22725 42b3cb MultiByteToWideChar 22724->22725 22743 42b473 22724->22743 22732 42b3f8 22725->22732 22725->22743 22748 42c5c6 GetLocaleInfoA 22726->22748 22728 421ddf ___ansicp 5 API calls 22730 428077 22728->22730 22730->22715 22731 42b4ca GetStringTypeA 22735 42b4e5 22731->22735 22731->22743 22736 42b40d _memset __crtLCMapStringA_stat 22732->22736 22737 421ecb _malloc 67 API calls 22732->22737 22734 42b446 MultiByteToWideChar 22739 42b45c GetStringTypeW 22734->22739 22740 42b46d 22734->22740 22741 421dee ___free_lconv_mon 67 API calls 22735->22741 22736->22734 22736->22743 22737->22736 22739->22740 22744 42893f 22740->22744 22741->22743 22743->22728 22745 42894b 22744->22745 22746 42895c 22744->22746 22745->22746 22747 421dee ___free_lconv_mon 67 API calls 22745->22747 22746->22743 22747->22746 22749 42c5f4 22748->22749 22750 42c5f9 22748->22750 22752 421ddf ___ansicp 5 API calls 22749->22752 22779 42ba60 22750->22779 22753 42b49d 22752->22753 22753->22731 22753->22743 22754 42c60f 22753->22754 22755 42c6d9 22754->22755 22756 42c64f GetCPInfo 22754->22756 22759 421ddf ___ansicp 5 API calls 22755->22759 22757 42c666 22756->22757 22758 42c6c4 MultiByteToWideChar 22756->22758 22757->22758 22760 42c66c GetCPInfo 22757->22760 22758->22755 22763 42c67f _strlen 22758->22763 22761 42b4be 22759->22761 22760->22758 22762 42c679 22760->22762 22761->22731 22761->22743 22762->22758 22762->22763 22764 421ecb _malloc 67 API calls 22763->22764 22766 42c6b1 _memset __crtLCMapStringA_stat 22763->22766 22764->22766 22765 42c70e MultiByteToWideChar 22767 42c726 22765->22767 22768 42c745 22765->22768 22766->22755 22766->22765 22770 42c74a 22767->22770 22771 42c72d WideCharToMultiByte 22767->22771 22769 42893f __freea 67 API calls 22768->22769 22769->22755 22772 42c755 WideCharToMultiByte 22770->22772 22773 42c769 22770->22773 22771->22768 22772->22768 22772->22773 22774 424b23 __calloc_crt 67 API calls 22773->22774 22782 42c9f2 22779->22782 22783 42ca0b 22782->22783 22784 42c7c3 strtoxl 91 API calls 22783->22784 22785 42ba71 22784->22785 22785->22749 22787 42b5b1 LCMapStringW 22786->22787 22788 42b5cc 22786->22788 22787->22788 22789 42b5d4 GetLastError 22787->22789 22790 42b7ca 22788->22790 22791 42b626 22788->22791 22789->22788 22793 42c5c6 ___ansicp 91 API calls 22790->22793 22792 42b63f MultiByteToWideChar 22791->22792 22794 42b7c1 22791->22794 22792->22794 22801 42b66c 22792->22801 22796 42b7f2 22793->22796 22795 421ddf ___ansicp 5 API calls 22794->22795 22797 428097 22795->22797 22796->22794 22798 42b8e6 LCMapStringA 22796->22798 22799 42b80b 22796->22799 22797->22708 22802 42b842 22798->22802 22803 42c60f ___convertcp 74 API calls 22799->22803 22800 42b6bd MultiByteToWideChar 22804 42b6d6 LCMapStringW 22800->22804 22805 42b7b8 22800->22805 22807 421ecb _malloc 67 API calls 22801->22807 22814 42b685 __crtLCMapStringA_stat 22801->22814 22806 42b90d 22802->22806 22811 421dee ___free_lconv_mon 67 API calls 22802->22811 22808 42b81d 22803->22808 22804->22805 22806->22794 22807->22814 22808->22794 22811->22806 22814->22794 22814->22800 22833->22699 22835 427609 22834->22835 22836 4241df __encode_pointer 6 API calls 22835->22836 22837 427621 22835->22837 22836->22835 22837->21631 22841 4225f0 22838->22841 22840 422639 22840->21633 22842 4225fc __lseeki64 22841->22842 22849 423d28 22842->22849 22848 42261d __lseeki64 22848->22840 22850 422f9f __lock 67 API calls 22849->22850 22851 422601 22850->22851 22852 422505 22851->22852 22853 42425a __decode_pointer 6 API calls 22852->22853 22854 422519 22853->22854 22855 42425a __decode_pointer 6 API calls 22854->22855 22856 422529 22855->22856 22864 4225ac 22856->22864 22872 425131 22856->22872 22858 422547 22860 42256b 22858->22860 22868 422593 22858->22868 22885 424b6f 22858->22885 22859 4241df __encode_pointer 6 API calls 22861 4225a1 22859->22861 22860->22864 22865 424b6f __realloc_crt 73 API calls 22860->22865 22866 422581 22860->22866 22863 4241df __encode_pointer 6 API calls 22861->22863 22863->22864 22869 422626 22864->22869 22865->22866 22866->22864 22867 4241df __encode_pointer 6 API calls 22866->22867 22867->22868 22868->22859 22934 423d31 22869->22934 22873 42513d __lseeki64 22872->22873 22874 42516a 22873->22874 22875 42514d 22873->22875 22877 4251ab HeapSize 22874->22877 22879 422f9f __lock 67 API calls 22874->22879 22876 422daa __flsbuf 67 API calls 22875->22876 22878 425152 22876->22878 22881 425162 __lseeki64 22877->22881 22880 424d46 __lseeki64 6 API calls 22878->22880 22882 42517a ___sbh_find_block 22879->22882 22880->22881 22881->22858 22890 4251cb 22882->22890 22889 424b78 22885->22889 22887 424bb7 22887->22860 22888 424b98 Sleep 22888->22889 22889->22887 22889->22888 22894 42266d 22889->22894 22893 422ec5 LeaveCriticalSection 22890->22893 22892 4251a6 22892->22877 22892->22881 22893->22892 22895 422679 __lseeki64 22894->22895 22896 422680 22895->22896 22897 42268e 22895->22897 22900 421ecb _malloc 67 API calls 22896->22900 22898 4226a1 22897->22898 22899 422695 22897->22899 22907 422813 22898->22907 22928 4226ae ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 22898->22928 22901 421dee ___free_lconv_mon 67 API calls 22899->22901 22902 422688 __dosmaperr __lseeki64 22900->22902 22901->22902 22902->22889 22928->22902 22937 422ec5 LeaveCriticalSection 22934->22937 22936 42262b 22936->22848 22937->22936 22939 41ea5b 22938->22939 22940 41ea3a 22938->22940 22942 421ddf ___ansicp 5 API calls 22939->22942 22940->22939 22941 41ea41 22940->22941 22943 421ddf ___ansicp 5 API calls 22941->22943 22944 41ea6b 22942->22944 22945 41ea54 22943->22945 22944->21646 22945->21646 22947 41f330 CoCreateInstance 22946->22947 22948 41f357 GetVersionExW 22946->22948 22947->22948 22948->21660 22948->21661 22950 4287c0 _memset 22949->22950 22951 41f711 GetModuleFileNameW 22950->22951 22952 41f740 _memset 22951->22952 22953 422938 67 API calls 22952->22953 22954 41f754 _wcsrchr 22953->22954 23212 41f63a _memset __write_nolock 23211->23212 23213 41f659 GetModuleFileNameW RegCreateKeyExW RegSetValueExW RegCloseKey 23212->23213 23214 421ddf ___ansicp 5 API calls 23213->23214 23215 41f6d4 23214->23215 23215->21661 24322 423e0c __lseeki64 24321->24322 24346 40ba4d 24362 40b530 24346->24362 24347 40b558 24519 40a9c0 24347->24519 24348 40b5c7 24533 40bb00 24348->24533 24350 421ecb _malloc 67 API calls 24350->24362 24354 42d9e5 __CxxThrowException@8 RaiseException 24354->24362 24356 40bb70 67 API calls 24367 40b5a8 24356->24367 24361 40b6f5 24363 40bb00 67 API calls 24361->24363 24362->24347 24362->24348 24362->24350 24362->24354 24362->24361 24368 40c4b0 73 API calls 24362->24368 24369 40b823 24362->24369 24370 40b8c6 24362->24370 24378 414f60 24362->24378 24383 40c030 24362->24383 24388 40c2c0 24362->24388 24392 409180 24362->24392 24365 40b724 24363->24365 24366 40bb70 67 API calls 24365->24366 24366->24367 24368->24362 24372 40bb00 67 API calls 24369->24372 24371 40bb00 67 API calls 24370->24371 24373 40b901 24371->24373 24374 40b85e 24372->24374 24375 40bb70 67 API calls 24373->24375 24376 40bb70 67 API calls 24374->24376 24375->24367 24376->24367 24379 414f90 24378->24379 24380 415011 24379->24380 24538 41c450 EnterCriticalSection 24379->24538 24380->24362 24381 41500a 24381->24362 24384 421ecb _malloc 67 API calls 24383->24384 24385 40c087 24384->24385 24386 42d9e5 __CxxThrowException@8 RaiseException 24385->24386 24387 40c0a3 24385->24387 24386->24387 24387->24362 24389 40c36e 24388->24389 24391 40c2d1 24388->24391 24389->24362 24391->24389 24541 40c0f0 24391->24541 24545 40dc00 24392->24545 24395 4099b6 24395->24362 24397 40933f 24572 408d70 24397->24572 24399 4094a3 24400 42d9e5 __CxxThrowException@8 RaiseException 24399->24400 24401 4094b8 24400->24401 24403 42d9e5 __CxxThrowException@8 RaiseException 24401->24403 24402 421ecb 67 API calls _malloc 24415 4091fd 24402->24415 24409 4094cd 24403->24409 24404 409427 24405 421ecb _malloc 67 API calls 24404->24405 24404->24409 24500 40973a 24404->24500 24406 409487 24405->24406 24406->24409 24412 42d9e5 __CxxThrowException@8 RaiseException 24406->24412 24407 40a179 24410 42d9e5 __CxxThrowException@8 RaiseException 24407->24410 24414 40a1c7 24407->24414 24408 40951d 24413 409100 67 API calls 24408->24413 24409->24408 24469 40958a 24409->24469 24410->24414 24411 409709 24587 40a530 24411->24587 24412->24399 24416 409532 DeleteCriticalSection 24413->24416 24421 40a247 24414->24421 24422 40a1da 24414->24422 24415->24397 24415->24399 24415->24401 24415->24402 24565 4130b0 24415->24565 24419 409553 24416->24419 24580 40a640 24419->24580 24429 4051f0 68 API calls 24421->24429 24427 409100 67 API calls 24422->24427 24423 409eb8 24433 409100 67 API calls 24423->24433 24431 40a1ef DeleteCriticalSection 24427->24431 24428 4098ae 24440 409100 67 API calls 24428->24440 24443 40a27d 24429->24443 24435 40a210 24431->24435 24432 40a2df 24465 421dee ___free_lconv_mon 67 API calls 24432->24465 24439 409edd DeleteCriticalSection 24433->24439 24434 4099d3 24445 409100 67 API calls 24434->24445 24441 40a640 67 API calls 24435->24441 24436 409f38 24442 409100 67 API calls 24436->24442 24437 409f86 24457 409100 67 API calls 24437->24457 24438 40994b 24450 409100 67 API calls 24438->24450 24446 409efe 24439->24446 24447 4098f3 DeleteCriticalSection 24440->24447 24448 40a22d 24441->24448 24449 409f65 DeleteCriticalSection 24442->24449 24443->24432 24456 4051f0 68 API calls 24443->24456 24444 4051f0 68 API calls 24444->24500 24451 409a00 DeleteCriticalSection 24445->24451 24452 40a640 67 API calls 24446->24452 24453 409914 24447->24453 24448->24362 24449->24437 24455 409978 DeleteCriticalSection 24450->24455 24459 409a21 24451->24459 24460 409f1b 24452->24460 24461 40a640 67 API calls 24453->24461 24454 4130b0 68 API calls 24454->24469 24462 409999 24455->24462 24456->24443 24463 409fc8 DeleteCriticalSection 24457->24463 24458 40a023 SysFreeString 24467 40a03e 24458->24467 24468 40a640 67 API calls 24459->24468 24460->24362 24470 409931 24461->24470 24471 40a640 67 API calls 24462->24471 24472 409fe9 24463->24472 24464 404b30 68 API calls 24464->24500 24473 40a33f 24465->24473 24466 412a70 77 API calls 24466->24469 24474 409100 67 API calls 24467->24474 24475 409a3e 24468->24475 24469->24411 24469->24428 24469->24434 24469->24438 24469->24454 24469->24466 24584 4139d0 24469->24584 24470->24362 24471->24395 24476 40a640 67 API calls 24472->24476 24481 421dee ___free_lconv_mon 67 API calls 24473->24481 24477 40a05b DeleteCriticalSection 24474->24477 24475->24362 24478 40a006 24476->24478 24479 40a07c 24477->24479 24478->24362 24482 40a640 67 API calls 24479->24482 24480 421ecb _malloc 67 API calls 24480->24500 24484 40a380 24481->24484 24485 40a099 24482->24485 24483 409c40 24490 421dee ___free_lconv_mon 67 API calls 24483->24490 24487 408bd0 67 API calls 24484->24487 24485->24362 24486 40a0b3 24492 42d9e5 __CxxThrowException@8 RaiseException 24486->24492 24491 40a3ad DeleteCriticalSection 24487->24491 24488 40a0c8 24493 421dee ___free_lconv_mon 67 API calls 24488->24493 24489 421dee 67 API calls ___free_lconv_mon 24489->24500 24494 409c6b 24490->24494 24495 40a3ce 24491->24495 24492->24488 24496 40a0d5 24493->24496 24505 421dee ___free_lconv_mon 67 API calls 24494->24505 24499 40a640 67 API calls 24495->24499 24497 421dee ___free_lconv_mon 67 API calls 24496->24497 24501 40a0e6 SysFreeString 24497->24501 24498 421dee ___free_lconv_mon 67 API calls 24502 409ae1 SysFreeString 24498->24502 24503 40a3eb 24499->24503 24500->24407 24500->24423 24500->24436 24500->24437 24500->24444 24500->24458 24500->24464 24500->24480 24500->24483 24500->24486 24500->24488 24500->24489 24500->24498 24504 40a104 24501->24504 24502->24500 24503->24362 24506 409100 67 API calls 24504->24506 24507 409ca0 24505->24507 24508 40a121 DeleteCriticalSection 24506->24508 24511 421dee ___free_lconv_mon 67 API calls 24507->24511 24509 40a142 24508->24509 24510 40a640 67 API calls 24509->24510 24512 40a15f 24510->24512 24513 409ce1 24511->24513 24512->24362 24602 408bd0 24513->24602 24516 409d2f 24517 40a640 67 API calls 24516->24517 24518 409d4c 24517->24518 24518->24362 24520 40a9ff 24519->24520 24521 421dee ___free_lconv_mon 67 API calls 24520->24521 24522 40aa23 24521->24522 24523 409100 24522->24523 24524 409143 24523->24524 24525 421dee ___free_lconv_mon 67 API calls 24524->24525 24526 40914c 24525->24526 24527 408bd0 67 API calls 24526->24527 24528 409166 24527->24528 24529 40bb70 24528->24529 24530 40bbaf 24529->24530 24531 421dee ___free_lconv_mon 67 API calls 24530->24531 24532 40bbd3 24531->24532 24532->24367 24534 40a9c0 67 API calls 24533->24534 24535 40bb36 24534->24535 24536 409100 67 API calls 24535->24536 24537 40b5ea 24536->24537 24537->24356 24539 41c4f8 LeaveCriticalSection 24538->24539 24540 41c4a2 24538->24540 24539->24381 24540->24539 24542 40c128 24541->24542 24544 407f40 73 API calls 24542->24544 24543 40c15f 24543->24391 24544->24543 24546 40dc40 24545->24546 24553 4091bd 24545->24553 24546->24553 24612 40db90 24546->24612 24548 40de9f 24551 421dee ___free_lconv_mon 67 API calls 24548->24551 24549 40db90 68 API calls 24554 40dcf8 24549->24554 24551->24553 24552 40dd2d 24555 421dee ___free_lconv_mon 67 API calls 24552->24555 24553->24395 24562 40a410 24553->24562 24554->24548 24554->24552 24560 40dd5a 24555->24560 24556 40df93 24557 421dee ___free_lconv_mon 67 API calls 24556->24557 24558 40dff7 24557->24558 24561 421dee ___free_lconv_mon 67 API calls 24558->24561 24559 4051f0 68 API calls 24559->24560 24560->24556 24560->24559 24561->24553 24618 4047c0 InitializeCriticalSection 24562->24618 24564 40a44c 24564->24415 24566 421ecb _malloc 67 API calls 24565->24566 24567 4130dd 24566->24567 24568 42d9e5 __CxxThrowException@8 RaiseException 24567->24568 24570 4130fb 24567->24570 24568->24570 24569 41314e 24569->24415 24570->24569 24571 4051f0 68 API calls 24570->24571 24571->24569 24575 408d82 24572->24575 24573 408f97 24573->24404 24574 408f3f 24574->24573 24578 4051f0 68 API calls 24574->24578 24576 4051f0 68 API calls 24575->24576 24577 408dee 24575->24577 24576->24575 24577->24574 24579 4051f0 68 API calls 24577->24579 24578->24574 24579->24577 24581 40a67f 24580->24581 24582 421dee ___free_lconv_mon 67 API calls 24581->24582 24583 409570 24582->24583 24583->24362 24619 413850 24584->24619 24588 40a544 24587->24588 24589 40af00 68 API calls 24588->24589 24590 40a54c 24589->24590 24591 40af00 68 API calls 24590->24591 24592 40a56a 24591->24592 24631 413690 24592->24631 24595 413690 68 API calls 24596 409718 24595->24596 24597 40af00 24596->24597 24598 4051f0 68 API calls 24597->24598 24600 40af1e 24598->24600 24599 40af7c 24599->24500 24600->24599 24601 4051f0 68 API calls 24600->24601 24601->24600 24603 408c17 24602->24603 24604 421dee ___free_lconv_mon 67 API calls 24603->24604 24605 408c20 24604->24605 24606 421dee ___free_lconv_mon 67 API calls 24605->24606 24607 408c50 24606->24607 24608 421dee ___free_lconv_mon 67 API calls 24607->24608 24609 408c7f 24608->24609 24610 421dee ___free_lconv_mon 67 API calls 24609->24610 24611 408caf DeleteCriticalSection 24610->24611 24611->24516 24613 40dba5 24612->24613 24614 4051f0 68 API calls 24613->24614 24616 40dbaa 24614->24616 24615 40dbee 24615->24548 24615->24549 24616->24615 24617 4051f0 68 API calls 24616->24617 24617->24616 24618->24564 24623 413886 24619->24623 24620 421ecb _malloc 67 API calls 24621 413937 24620->24621 24622 413953 24621->24622 24625 42d9e5 __CxxThrowException@8 RaiseException 24621->24625 24627 414150 VirtualAlloc 24622->24627 24623->24620 24626 413965 24623->24626 24625->24622 24626->24469 24628 414216 24627->24628 24629 41422d 24627->24629 24630 42d9e5 __CxxThrowException@8 RaiseException 24628->24630 24629->24626 24630->24629 24632 4051f0 68 API calls 24631->24632 24634 4136ac 24632->24634 24633 40a588 24633->24595 24634->24633 24635 4051f0 68 API calls 24634->24635 24635->24634 24636 40b1d0 24649 40b21b 24636->24649 24637 40b409 24683 41c380 EnterCriticalSection 24637->24683 24638 40b419 24640 40b43f 24638->24640 24641 40b41f 24638->24641 24645 421ecb _malloc 67 API calls 24640->24645 24642 40bb70 67 API calls 24641->24642 24644 40b246 24642->24644 24643 40bc00 68 API calls 24643->24649 24646 40b488 24645->24646 24648 42d9e5 __CxxThrowException@8 RaiseException 24646->24648 24652 40b4a4 24646->24652 24647 421dee 67 API calls ___free_lconv_mon 24647->24649 24648->24652 24649->24637 24649->24643 24649->24644 24649->24647 24650 4051f0 68 API calls 24649->24650 24686 40b120 24649->24686 24692 40b000 24649->24692 24650->24649 24653 40b558 24652->24653 24654 40b5c7 24652->24654 24656 421ecb _malloc 67 API calls 24652->24656 24660 42d9e5 __CxxThrowException@8 RaiseException 24652->24660 24661 40c030 68 API calls 24652->24661 24666 40c2c0 73 API calls 24652->24666 24667 40b6f5 24652->24667 24669 409180 94 API calls 24652->24669 24672 40c4b0 73 API calls 24652->24672 24673 40b8c6 24652->24673 24674 40b823 24652->24674 24681 414f60 2 API calls 24652->24681 24655 40a9c0 67 API calls 24653->24655 24657 40bb00 67 API calls 24654->24657 24658 40b578 24655->24658 24656->24652 24659 40b5ea 24657->24659 24663 409100 67 API calls 24658->24663 24662 40bb70 67 API calls 24659->24662 24660->24652 24661->24652 24662->24644 24664 40b59b 24663->24664 24665 40bb70 67 API calls 24664->24665 24665->24644 24666->24652 24668 40bb00 67 API calls 24667->24668 24670 40b724 24668->24670 24669->24652 24671 40bb70 67 API calls 24670->24671 24671->24644 24672->24652 24675 40bb00 67 API calls 24673->24675 24676 40bb00 67 API calls 24674->24676 24677 40b901 24675->24677 24678 40b85e 24676->24678 24679 40bb70 67 API calls 24677->24679 24680 40bb70 67 API calls 24678->24680 24679->24644 24680->24644 24681->24652 24684 41c426 LeaveCriticalSection 24683->24684 24685 41c3d6 24683->24685 24684->24638 24685->24684 24687 40b1ab 24686->24687 24688 40b17b 24686->24688 24687->24649 24689 4051f0 68 API calls 24688->24689 24690 40b183 24689->24690 24690->24687 24691 4051f0 68 API calls 24690->24691 24691->24687 24693 40b008 24692->24693 24697 40b00c 24692->24697 24693->24649 24694 42d9e5 __CxxThrowException@8 RaiseException 24696 40b05c 24694->24696 24695 40b02f 24695->24649 24696->24649 24697->24694 24697->24695 24698 41be50 24699 41be60 KillTimer 24698->24699 24700 41be7b 24698->24700 24699->24700 24701 41be96 KiUserCallbackDispatcher 24699->24701 24704 4064e0 24700->24704 24703 41be91 24705 40657f 24704->24705 24706 4064f2 24704->24706 24707 406680 SetEvent 24705->24707 24710 4064fe 24705->24710 24708 40654e 24706->24708 24709 406520 24706->24709 24706->24710 24707->24703 24708->24703 24714 406546 24709->24714 24715 406526 GetDesktopWindow SetForegroundWindow 24709->24715 24712 4065fc 24710->24712 24713 4065ae ShowWindow 24710->24713 24716 406507 24710->24716 24718 406601 ShowWindow 24712->24718 24719 406645 24712->24719 24717 4065c0 PeekMessageW 24713->24717 24714->24703 24715->24703 24716->24703 24717->24717 24721 4065d2 DialogBoxParamW SetEvent 24717->24721 24720 406610 PeekMessageW 24718->24720 24719->24703 24720->24720 24722 406622 MessageBoxW SetEvent 24720->24722 24721->24712 24722->24719 24723 41c950 EnterCriticalSection LeaveCriticalSection 24724 41c990 24723->24724 24725 41c99e 24723->24725 24726 41cb0b 24725->24726 24727 404e70 68 API calls 24725->24727 24728 408890 VariantClear 24726->24728 24729 41c9f7 24727->24729 24730 41cb17 24728->24730 24731 41ca01 24729->24731 24732 41ca0d 24729->24732 24733 404bf0 68 API calls 24731->24733 24734 41cb9a 24732->24734 24735 4067a0 68 API calls 24732->24735 24736 41ca0b 24733->24736 24737 421dee ___free_lconv_mon 67 API calls 24734->24737 24735->24736 24738 404bf0 68 API calls 24736->24738 24739 41cba4 24737->24739 24752 41ca33 24738->24752 24740 408890 VariantClear 24739->24740 24741 41cbb0 24740->24741 24742 421dee ___free_lconv_mon 67 API calls 24744 41cece 24742->24744 24743 41caf8 24745 408890 VariantClear 24743->24745 24746 408890 VariantClear 24744->24746 24747 41cab0 24745->24747 24750 41ceda 24746->24750 24751 421dee ___free_lconv_mon 67 API calls 24747->24751 24748 41cc0f 24749 408890 VariantClear 24748->24749 24749->24734 24751->24726 24752->24743 24752->24748 24753 41cab7 24752->24753 24754 41caa7 24752->24754 24820 41cccb 24752->24820 24756 41cb22 24753->24756 24757 41caef 24753->24757 24755 408890 VariantClear 24754->24755 24755->24747 24759 408890 VariantClear 24756->24759 24758 408890 VariantClear 24757->24758 24758->24743 24760 41cb3e 24759->24760 24761 41cb83 24760->24761 24762 41cb59 24760->24762 24764 41cbbe 24761->24764 24765 41cb91 24761->24765 24763 408890 VariantClear 24762->24763 24766 41cb62 24763->24766 24769 406230 68 API calls 24764->24769 24767 408890 VariantClear 24765->24767 24768 421dee ___free_lconv_mon 67 API calls 24766->24768 24767->24734 24770 41cb6c 24768->24770 24771 41cc00 24769->24771 24772 408890 VariantClear 24770->24772 24773 41cc07 24771->24773 24774 41cc1f 24771->24774 24776 41cb78 24772->24776 24777 404920 67 API calls 24773->24777 24775 404b90 68 API calls 24774->24775 24779 41cc2c 24775->24779 24777->24748 24778 41cc61 24780 407ca0 68 API calls 24778->24780 24779->24778 24852 41c840 24779->24852 24782 41cc73 24780->24782 24783 41ccd5 24782->24783 24784 41cc79 24782->24784 24849 407040 24783->24849 24786 404bf0 68 API calls 24784->24786 24787 41cc87 24786->24787 24789 41cc90 24787->24789 24790 41cc98 24787->24790 24792 406b00 71 API calls 24789->24792 24837 406920 CreateFileW 24790->24837 24791 407f40 73 API calls 24793 41ccea 24791->24793 24795 41cc96 24792->24795 24796 41cd9c 24793->24796 24797 4070d0 80 API calls 24793->24797 24798 421dee ___free_lconv_mon 67 API calls 24795->24798 24802 405350 68 API calls 24796->24802 24819 41ce30 24796->24819 24799 41ccfc 24797->24799 24800 41cca8 24798->24800 24799->24796 24803 41cd04 24799->24803 24804 421dee ___free_lconv_mon 67 API calls 24800->24804 24801 404bf0 68 API calls 24805 41ce7c 24801->24805 24806 41cdb1 24802->24806 24809 404bf0 68 API calls 24803->24809 24832 41cd1c 24803->24832 24807 41ccb5 24804->24807 24808 421dee ___free_lconv_mon 67 API calls 24805->24808 24812 4083b0 72 API calls 24806->24812 24810 404920 67 API calls 24807->24810 24811 41ce89 24808->24811 24809->24832 24813 41ccc2 24810->24813 24814 421dee ___free_lconv_mon 67 API calls 24811->24814 24815 41cdfc 24812->24815 24816 408890 VariantClear 24813->24816 24817 41ce96 24814->24817 24815->24819 24823 41ce0b 24815->24823 24816->24820 24821 421dee ___free_lconv_mon 67 API calls 24817->24821 24818 421dee ___free_lconv_mon 67 API calls 24822 41cd62 24818->24822 24819->24801 24820->24742 24824 41cea3 24821->24824 24826 421dee ___free_lconv_mon 67 API calls 24822->24826 24827 404bf0 68 API calls 24823->24827 24825 404920 67 API calls 24824->24825 24828 41ceb0 24825->24828 24829 41cd6f 24826->24829 24827->24832 24830 408890 VariantClear 24828->24830 24831 421dee ___free_lconv_mon 67 API calls 24829->24831 24830->24820 24833 41cd7c 24831->24833 24832->24818 24834 404920 67 API calls 24833->24834 24835 41cd89 24834->24835 24836 408890 VariantClear 24835->24836 24836->24734 24838 40696b 24837->24838 24848 4069cc 24837->24848 24841 404e70 68 API calls 24838->24841 24839 4069f4 24839->24795 24840 4069d8 SetFileTime CloseHandle 24840->24839 24842 406982 24841->24842 24843 4081c0 69 API calls 24842->24843 24844 406993 24843->24844 24845 4069be 24844->24845 24846 4069a7 CreateFileW 24844->24846 24847 421dee ___free_lconv_mon 67 API calls 24845->24847 24846->24845 24847->24848 24848->24839 24848->24840 24850 404e70 68 API calls 24849->24850 24851 407055 24850->24851 24851->24791 24853 404b90 68 API calls 24852->24853 24859 41c875 24853->24859 24854 41c920 24856 421dee ___free_lconv_mon 67 API calls 24854->24856 24855 406370 68 API calls 24855->24859 24857 41c934 24856->24857 24857->24778 24858 406bc0 72 API calls 24858->24859 24859->24854 24859->24855 24859->24858 24860 404e70 68 API calls 24859->24860 24860->24859 24861 41cf10 24862 41d013 24861->24862 24867 41cf22 24861->24867 24863 41d020 SetFileTime 24862->24863 24864 41d04e 24862->24864 24863->24864 24865 41d043 CloseHandle 24863->24865 24868 41d0a1 24864->24868 24873 406a10 71 API calls 24864->24873 24865->24864 24866 41d056 GetLastError 24865->24866 24866->24864 24870 41d060 24866->24870 24871 41cf44 24867->24871 24872 41cf79 24867->24872 24869 404bf0 68 API calls 24875 41cf89 24869->24875 24871->24869 24871->24875 24874 404bf0 68 API calls 24872->24874 24873->24868 24874->24875 24876 41c010 GetDlgItem SendMessageW 24877 416790 24878 416797 24877->24878 24879 41679f 24877->24879 24884 4024a0 24879->24884 24881 4167b4 24882 421ecb _malloc 67 API calls 24881->24882 24883 4167c0 24881->24883 24882->24883 24885 40251a 24884->24885 24888 4024b9 24884->24888 24886 421ddf ___ansicp 5 API calls 24885->24886 24887 40252b 24886->24887 24887->24881 24889 421ddf ___ansicp 5 API calls 24888->24889 24890 402514 24889->24890 24890->24881 24891 417090 24893 4170ad 24891->24893 24892 4170b9 24893->24892 24896 417040 24893->24896 24897 417047 24896->24897 24898 421dee ___free_lconv_mon 67 API calls 24897->24898 24901 41706e 24897->24901 24899 41705b 24898->24899 24900 421ecb _malloc 67 API calls 24899->24900 24899->24901 24900->24901 24911 412659 24912 412660 24911->24912 24913 4126ce 24912->24913 24916 4051f0 68 API calls 24912->24916 24914 412702 24913->24914 24915 4126dd 24913->24915 24934 415fc0 24914->24934 24921 413ba0 24915->24921 24928 414c40 EnterCriticalSection 24915->24928 24916->24912 24917 412700 24922 413bb0 ReadFile 24921->24922 24923 413bab 24921->24923 24924 413be0 24922->24924 24923->24922 24925 413bea 24924->24925 24926 413bef GetLastError 24924->24926 24925->24917 24927 413bf9 24926->24927 24927->24917 24933 413c10 3 API calls 24928->24933 24929 414c94 24930 414cb8 LeaveCriticalSection 24929->24930 24931 414c9a LeaveCriticalSection 24929->24931 24930->24917 24931->24917 24933->24929 24937 415a80 24934->24937 24936 41600f 24936->24917 24938 415ab6 24937->24938 24939 415f9d 24937->24939 24938->24939 24970 414ac0 24938->24970 24939->24936 24941 415ad1 24942 415ad5 24941->24942 24943 414ac0 2 API calls 24941->24943 24942->24936 24944 415afd 24943->24944 24944->24942 24945 414ac0 2 API calls 24944->24945 24946 415b0f 24945->24946 24946->24942 24947 414ac0 2 API calls 24946->24947 24948 415b21 24947->24948 24948->24942 24977 414d50 24948->24977 24951 415b38 24951->24942 24984 415740 24951->24984 24952 414b50 RaiseException 24959 415c21 24952->24959 24956 415edf 24957 415efa 24956->24957 25004 414df0 24956->25004 24957->24936 24958 415ebb 24958->24936 24959->24952 24959->24956 24959->24958 24960 414df0 __VEC_memcpy 24959->24960 24961 415f51 24959->24961 24963 415f64 24959->24963 24964 415f77 24959->24964 24965 415f8a 24959->24965 24969 414f60 2 API calls 24959->24969 24988 414e80 24959->24988 24997 416080 24959->24997 24960->24959 24962 42d9e5 __CxxThrowException@8 RaiseException 24961->24962 24962->24963 24966 42d9e5 __CxxThrowException@8 RaiseException 24963->24966 24967 42d9e5 __CxxThrowException@8 RaiseException 24964->24967 24968 42d9e5 __CxxThrowException@8 RaiseException 24965->24968 24966->24964 24967->24965 24968->24939 24969->24959 24971 414ac8 24970->24971 24972 414aef 24971->24972 24973 414ad9 24971->24973 24976 414ae1 VirtualFree 24971->24976 24974 414b0d VirtualAlloc 24972->24974 24975 414afd 24972->24975 24973->24941 24974->24941 24975->24941 24976->24972 24980 414d58 24977->24980 24978 414d7e 24981 414d8b 24978->24981 24982 414d9a VirtualAlloc 24978->24982 24979 414d68 24979->24951 24980->24978 24980->24979 24983 414d70 VirtualFree 24980->24983 24981->24951 24982->24951 24983->24978 24985 415765 24984->24985 24987 41579a 24985->24987 25008 414b50 24985->25008 24987->24959 24989 414ea1 24988->24989 24991 414e8c 24988->24991 24989->24959 24990 414df0 __VEC_memcpy 24990->24991 24991->24989 24991->24990 24992 414ea4 24991->24992 24993 42d9e5 __CxxThrowException@8 RaiseException 24992->24993 24994 414eb7 24993->24994 24995 421dee ___free_lconv_mon 67 API calls 24994->24995 24996 414eda 24994->24996 24995->24996 24996->24959 24998 416095 24997->24998 24999 4160eb 24997->24999 25001 414b50 RaiseException 24998->25001 25002 4160bd 24998->25002 25000 414b50 RaiseException 24999->25000 25003 416115 24999->25003 25000->25003 25001->25002 25002->24959 25003->24959 25005 414dfe 25004->25005 25006 4221a0 ___sbh_free_block __VEC_memcpy 25005->25006 25007 414e1b 25005->25007 25006->25007 25007->24956 25009 414b59 25008->25009 25010 414b5f 25008->25010 25009->24985 25011 414b9b 25010->25011 25012 42d9e5 __CxxThrowException@8 RaiseException 25010->25012 25011->24985 25012->25011 25013 419e5e 25015 419e60 25013->25015 25014 405140 2 API calls 25014->25015 25015->25014 25016 419f00 25015->25016 25017 4051f0 68 API calls 25015->25017 25018 4052a0 68 API calls 25015->25018 25020 419f1a 25016->25020 25034 419f79 25016->25034 25017->25015 25018->25015 25019 41a092 25022 421dee ___free_lconv_mon 67 API calls 25019->25022 25021 421dee ___free_lconv_mon 67 API calls 25020->25021 25025 419f3c 25021->25025 25023 41a0b8 25022->25023 25026 421dee ___free_lconv_mon 67 API calls 25023->25026 25024 41a109 25031 421dee ___free_lconv_mon 67 API calls 25024->25031 25027 421dee ___free_lconv_mon 67 API calls 25025->25027 25028 41a0d6 25026->25028 25029 419f5a 25027->25029 25030 421dee ___free_lconv_mon 67 API calls 25028->25030 25032 421dee ___free_lconv_mon 67 API calls 25029->25032 25084 419f6f 25030->25084 25033 41a130 25031->25033 25032->25084 25036 421dee ___free_lconv_mon 67 API calls 25033->25036 25034->25019 25034->25024 25035 41a167 25034->25035 25037 41a1d8 25034->25037 25085 40d1d0 97 API calls 25034->25085 25086 40d1b0 97 API calls 25034->25086 25087 413c10 3 API calls 25034->25087 25041 421dee ___free_lconv_mon 67 API calls 25035->25041 25038 41a14e 25036->25038 25039 41a1dc 25037->25039 25045 41a24a 25037->25045 25040 421dee ___free_lconv_mon 67 API calls 25038->25040 25047 421dee ___free_lconv_mon 67 API calls 25039->25047 25040->25084 25044 41a19b 25041->25044 25042 41a297 25043 408890 VariantClear 25042->25043 25046 41a2a7 25043->25046 25048 421dee ___free_lconv_mon 67 API calls 25044->25048 25045->25042 25049 4067a0 68 API calls 25045->25049 25056 41a36b 25046->25056 25057 41a2df 25046->25057 25050 41a210 25047->25050 25051 41a1b9 25048->25051 25049->25042 25052 421dee ___free_lconv_mon 67 API calls 25050->25052 25053 421dee ___free_lconv_mon 67 API calls 25051->25053 25054 41a22e 25052->25054 25053->25084 25055 421dee ___free_lconv_mon 67 API calls 25054->25055 25055->25084 25058 419a00 2 API calls 25056->25058 25059 404b30 68 API calls 25057->25059 25060 41a374 25058->25060 25061 41a2ed 25059->25061 25063 418e00 70 API calls 25060->25063 25062 404b30 68 API calls 25061->25062 25064 41a2fb 25062->25064 25065 41a395 25063->25065 25066 418e00 70 API calls 25064->25066 25067 404bf0 68 API calls 25065->25067 25068 41a31c 25066->25068 25069 41a3ab 25067->25069 25070 404bf0 68 API calls 25068->25070 25071 421dee ___free_lconv_mon 67 API calls 25069->25071 25072 41a332 25070->25072 25078 41a364 25071->25078 25073 421dee ___free_lconv_mon 67 API calls 25072->25073 25074 41a340 25073->25074 25075 421dee ___free_lconv_mon 67 API calls 25074->25075 25076 41a352 25075->25076 25077 421dee ___free_lconv_mon 67 API calls 25076->25077 25077->25078 25079 421dee ___free_lconv_mon 67 API calls 25078->25079 25080 41a3f1 25079->25080 25081 421dee ___free_lconv_mon 67 API calls 25080->25081 25082 41a40e 25081->25082 25083 421dee ___free_lconv_mon 67 API calls 25082->25083 25083->25084 25085->25034 25086->25034 25087->25034 25097 40bce1 25098 40bcf9 25097->25098 25099 40bd66 25098->25099 25102 421dee 67 API calls ___free_lconv_mon 25098->25102 25100 40bd9a 25099->25100 25101 4221a0 ___sbh_free_block __VEC_memcpy 25099->25101 25101->25100 25102->25098 25103 4166a0 25104 4166a8 25103->25104 25105 4166ab 25103->25105 25106 421ecb _malloc 67 API calls 25105->25106 25107 4166b1 25106->25107 25108 4158a0 25109 4158ba 25108->25109 25110 4158ae 25108->25110 25114 4158d0 25110->25114 25113 421dee ___free_lconv_mon 67 API calls 25113->25109 25125 4156c0 25114->25125 25119 415640 VirtualFree 25120 415925 25119->25120 25121 415640 VirtualFree 25120->25121 25122 415933 25121->25122 25123 415640 VirtualFree 25122->25123 25124 4158b4 25123->25124 25124->25113 25126 4156f3 VirtualFree 25125->25126 25127 415701 25125->25127 25126->25127 25128 415640 25127->25128 25129 415682 25128->25129 25130 415674 VirtualFree 25128->25130 25129->25119 25130->25129 25131 41bd70 EnterCriticalSection LeaveCriticalSection 25132 41bda0 25131->25132 25140 41be0a __aulldiv __winput_l 25131->25140 25133 41bda5 PostMessageW 25132->25133 25134 41bdbb EnterCriticalSection LeaveCriticalSection 25132->25134 25133->25134 25135 41bdf2 25134->25135 25136 41bded 25134->25136 25145 41bca0 25135->25145 25136->25135 25137 41bdf9 25136->25137 25141 41bcf0 25137->25141 25144 41bd05 25141->25144 25142 41bd45 SendMessageW 25143 41bd5b 25142->25143 25143->25140 25144->25142 25144->25143 25146 41bcc6 25145->25146 25147 41bcd2 SendMessageW 25146->25147 25147->25137 25148 41daf0 25153 41d9c0 25148->25153 25151 41db05 25152 421dee ___free_lconv_mon 67 API calls 25152->25151 25154 41da15 DestroyWindow 25153->25154 25155 41da21 25153->25155 25154->25155 25156 41da32 DestroyWindow 25155->25156 25157 41da3e 25155->25157 25156->25157 25158 421dee ___free_lconv_mon 67 API calls 25157->25158 25159 41da51 25158->25159 25160 421dee ___free_lconv_mon 67 API calls 25159->25160 25161 41da5d 25160->25161 25172 41d5e0 DeleteCriticalSection 25161->25172 25164 421dee ___free_lconv_mon 67 API calls 25165 41da81 25164->25165 25166 421dee ___free_lconv_mon 67 API calls 25165->25166 25167 41daa6 25166->25167 25168 421dee ___free_lconv_mon 67 API calls 25167->25168 25169 41dab4 25168->25169 25170 421dee ___free_lconv_mon 67 API calls 25169->25170 25171 41dac2 25170->25171 25171->25151 25171->25152 25173 41d61e CloseHandle 25172->25173 25175 41d631 25172->25175 25174 41d629 GetLastError 25173->25174 25173->25175 25174->25175 25176 421dee ___free_lconv_mon 67 API calls 25175->25176 25177 41d646 25176->25177 25177->25164 25178 41b9b0 GetDlgItem 25179 41ba07 LoadIconW SendMessageW 25178->25179 25180 41ba2e SetTimer SetWindowTextW 25178->25180 25179->25180 25181 41ba53 PostMessageW 25180->25181 25182 41ba67 25180->25182 25181->25182 25183 404e70 68 API calls 25182->25183 25184 41ba7e 25183->25184 25185 41b1d0 69 API calls 25184->25185 25186 41ba90 25185->25186 25187 404bf0 68 API calls 25186->25187 25188 41ba9e 25187->25188 25189 421dee ___free_lconv_mon 67 API calls 25188->25189 25190 41baac SetDlgItemTextW 25189->25190 25191 404e70 68 API calls 25190->25191 25192 41bada 25191->25192 25193 41b1d0 69 API calls 25192->25193 25194 41baed 25193->25194 25195 404bf0 68 API calls 25194->25195 25196 41bafb 25195->25196 25197 421dee ___free_lconv_mon 67 API calls 25196->25197 25198 41bb0a SetDlgItemTextW SendMessageW SetEvent 25197->25198 25199 41bb45 GetLastError 25198->25199 25200 41bb4b 25198->25200 25199->25200 25201 41bb56 GetWindowRect GetWindowRect SystemParametersInfoW 25200->25201 25202 41bc3e 25200->25202 25204 41bc0a MoveWindow 25201->25204 25203 421dee ___free_lconv_mon 67 API calls 25202->25203 25205 41bc4c 25203->25205 25204->25202 25207 421dee ___free_lconv_mon 67 API calls 25205->25207 25208 41bc5e 25207->25208 25209 4154b0 25210 4154bd CreateEventW 25209->25210 25211 4154df 25209->25211 25210->25211 25212 4154ce GetLastError 25210->25212 25213 4154e5 CreateEventW 25211->25213 25214 4154f6 ResetEvent 25211->25214 25215 4154d8 25212->25215 25213->25212 25213->25214 25216 41550d GetLastError 25214->25216 25217 41550f ResetEvent 25214->25217 25216->25217 25218 415519 GetLastError 25217->25218 25219 41551b 25217->25219 25218->25219 25220 415529 25219->25220 25222 415410 25219->25222 25223 422096 86 API calls 25222->25223 25224 415422 25223->25224 25225 415435 GetLastError 25224->25225 25226 41542f 25224->25226 25227 41543f 25225->25227 25226->25215 25227->25215 25228 410137 25247 40ffa6 25228->25247 25229 410194 25231 40a9c0 67 API calls 25229->25231 25232 4101ab 25231->25232 25233 409100 67 API calls 25232->25233 25235 4101db 25233->25235 25234 40b000 RaiseException 25234->25247 25239 421dee ___free_lconv_mon 67 API calls 25235->25239 25236 4103b2 25237 40e0c0 RaiseException 25236->25237 25238 4103b7 25237->25238 25240 42d9e5 __CxxThrowException@8 RaiseException 25238->25240 25241 410206 25239->25241 25242 4103cc 25240->25242 25248 421dee ___free_lconv_mon 67 API calls 25241->25248 25244 42d9e5 __CxxThrowException@8 RaiseException 25242->25244 25243 421ecb 67 API calls _malloc 25243->25247 25246 4103e1 25244->25246 25245 421dee 67 API calls ___free_lconv_mon 25245->25247 25252 40bb00 67 API calls 25246->25252 25247->25229 25247->25234 25247->25236 25247->25238 25247->25242 25247->25243 25247->25245 25247->25246 25250 409180 94 API calls 25247->25250 25251 4221a0 ___sbh_free_block __VEC_memcpy 25247->25251 25281 411e60 25247->25281 25249 41023b 25248->25249 25254 421dee ___free_lconv_mon 67 API calls 25249->25254 25250->25247 25251->25247 25253 410406 25252->25253 25256 421dee ___free_lconv_mon 67 API calls 25253->25256 25255 410270 25254->25255 25257 421dee ___free_lconv_mon 67 API calls 25255->25257 25258 410433 25256->25258 25259 4102b1 25257->25259 25261 421dee ___free_lconv_mon 67 API calls 25258->25261 25294 40d610 25259->25294 25263 410468 25261->25263 25265 421dee ___free_lconv_mon 67 API calls 25263->25265 25264 421dee ___free_lconv_mon 67 API calls 25266 410310 25264->25266 25267 41049d 25265->25267 25268 421dee ___free_lconv_mon 67 API calls 25266->25268 25269 421dee ___free_lconv_mon 67 API calls 25267->25269 25270 41034d 25268->25270 25271 4104de 25269->25271 25273 421dee ___free_lconv_mon 67 API calls 25270->25273 25272 40d610 67 API calls 25271->25272 25274 41050b 25272->25274 25280 410391 25273->25280 25275 421dee ___free_lconv_mon 67 API calls 25274->25275 25276 41053d 25275->25276 25277 421dee ___free_lconv_mon 67 API calls 25276->25277 25278 41057b 25277->25278 25279 421dee ___free_lconv_mon 67 API calls 25278->25279 25279->25280 25282 421ecb _malloc 67 API calls 25281->25282 25283 411e8b 25282->25283 25284 411eab 25283->25284 25285 42d9e5 __CxxThrowException@8 RaiseException 25283->25285 25286 421dee ___free_lconv_mon 67 API calls 25284->25286 25285->25284 25287 411ec6 25286->25287 25289 40a5d0 68 API calls 25287->25289 25291 411ef6 25287->25291 25288 411f2e 25288->25247 25290 411ee1 25289->25290 25292 4221a0 ___sbh_free_block __VEC_memcpy 25290->25292 25291->25288 25293 4051f0 68 API calls 25291->25293 25292->25291 25293->25288 25295 40d64f 25294->25295 25296 421dee ___free_lconv_mon 67 API calls 25295->25296 25297 40d673 25296->25297 25297->25264
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(kernel32.dll), ref: 0041FF8F
                                                          • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0041FFA7
                                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectory), ref: 0041FFBE
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                          • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0041FFD1
                                                          • FreeLibrary.KERNEL32(00000000), ref: 0041FFDC
                                                          • MessageBoxW.USER32(00000000,023F1528,?,00012010), ref: 00420015
                                                          • CoInitialize.OLE32(00000000), ref: 00420045
                                                          • _memset.LIBCMT ref: 00420059
                                                          • GetVersionExW.KERNEL32 ref: 0042007E
                                                          • GetCommandLineW.KERNEL32(00000004,00000004,00000004,00000004), ref: 0042013D
                                                          • _malloc.LIBCMT ref: 004202E1
                                                          • __CxxThrowException@8.LIBCMT ref: 00420301
                                                          • MessageBoxW.USER32(00000000,?,?,00000024), ref: 00420916
                                                            • Part of subcall function 0041EA80: MessageBoxW.USER32(00000000,?,00000000,00012010), ref: 0041EAA0
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AddressMessageProc$Exception@8FreeLibraryThrow_malloc$CommandErrorHeapInitializeLastLineLoadVersion___sbh_find_block___sbh_free_block__lock_memset
                                                          • String ID: $ $ $ /m="$"$" /k="$"-k=$"/k=$%%T$%%T\$-k=$/k=$<$<$@E$BeginPrompt$D$Directory$ExecuteFile$ExecuteParameters$Progress$RunProgram$SetDefaultDllDirectories$SetDllDirectory$SetSearchPathMode$Title$`A$kernel32.dll$mia.lib$runas$setup.exe
                                                          • API String ID: 2774692769-3493990677
                                                          • Opcode ID: daaa674b2ad1d50fc3211e2271210bce0b7d211d1a0899aaaade4bedbd3bb0f7
                                                          • Instruction ID: 441557ecdbd4f95e2da424cce832fc79fed486ae06a920805007eef883770e54
                                                          • Opcode Fuzzy Hash: daaa674b2ad1d50fc3211e2271210bce0b7d211d1a0899aaaade4bedbd3bb0f7
                                                          • Instruction Fuzzy Hash: 23E2A7B16143509BD220EB75EC82B9FB3E4AFD4308F50492EF58997252DA39F508C79B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 843 41f0e0-41f120 call 41b1d0 846 41f122 843->846 847 41f125-41f136 call 405140 843->847 846->847 850 41f143-41f154 call 405140 847->850 851 41f138-41f13e GetSystemDefaultUILanguage 847->851 858 41f15a-41f15c 850->858 859 41f26e-41f27f call 405140 850->859 852 41f2cd-41f2d2 851->852 854 41f2d4-41f2db SetThreadUILanguage 852->854 855 41f2dd-41f2e1 SetThreadLocale 852->855 857 41f2e7-41f30f call 421dee 854->857 855->857 862 41f169-41f18a LoadLibraryW 858->862 863 41f15e-41f164 GetSystemDefaultUILanguage 858->863 870 41f281-41f287 GetUserDefaultUILanguage 859->870 871 41f289-41f2a1 859->871 866 41f190-41f19e GetProcAddress 862->866 867 41f253-41f25a 862->867 863->852 872 41f1b1-41f1ba FreeLibrary 866->872 873 41f1a0-41f1af 866->873 868 41f262-41f26c SetThreadUILanguage 867->868 869 41f25c GetSystemDefaultUILanguage 867->869 868->857 869->868 870->852 875 41f2a3-41f2a4 call 404e70 871->875 876 41f2a9-41f2af 871->876 872->867 874 41f1c0-41f1e1 call 421ecb 872->874 873->872 883 41f1e3-41f1f3 call 42d9e5 874->883 884 41f1f8-41f209 LoadLibraryW 874->884 875->876 879 41f2b0-41f2bf 876->879 879->879 882 41f2c1-41f2c8 call 41eaf0 879->882 882->852 883->884 887 41f20b-41f219 GetProcAddress 884->887 888 41f24a-41f250 call 421dee 884->888 889 41f21b-41f22a 887->889 890 41f22c-41f235 FreeLibrary 887->890 888->867 889->890 890->888 893 41f237-41f247 call 422916 890->893 893->888
                                                          APIs
                                                          • GetSystemDefaultUILanguage.KERNEL32(?,INSTALL), ref: 0041F138
                                                          • SetThreadUILanguage.KERNELBASE(?,?,?,00000000,?,00000000,0042FDF8,000000FF,0042017D,?,?), ref: 0041F2D5
                                                            • Part of subcall function 00405140: CharUpperW.USER32(?,?,?,?,00000000,0041DDDA,?,TRUE,537E08AE), ref: 00405175
                                                            • Part of subcall function 00405140: CharUpperW.USER32(?,?,?,?,00000000,0041DDDA,?,TRUE,537E08AE), ref: 0040517E
                                                          • GetSystemDefaultUILanguage.KERNEL32(?,SYSTEM,?,INSTALL), ref: 0041F15E
                                                          • LoadLibraryW.KERNEL32(Kernel32.dll,?,SYSTEM,?,INSTALL), ref: 0041F180
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemPreferredUILanguages), ref: 0041F196
                                                          • FreeLibrary.KERNEL32(00000000), ref: 0041F1B2
                                                          • _malloc.LIBCMT ref: 0041F1D5
                                                          • __CxxThrowException@8.LIBCMT ref: 0041F1F3
                                                          • LoadLibraryW.KERNEL32(Kernel32.dll,00000000,?,00000000,0042FDF8,000000FF,0042017D,?,?), ref: 0041F1FF
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemPreferredUILanguages), ref: 0041F211
                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,0042FDF8,000000FF,0042017D,?,?), ref: 0041F22D
                                                          • _swscanf.LIBCMT ref: 0041F242
                                                          • GetSystemDefaultUILanguage.KERNEL32(?,?,?,00000000,0042FDF8,000000FF,0042017D,?,?), ref: 0041F25C
                                                          • SetThreadUILanguage.KERNEL32(?), ref: 0041F266
                                                          • GetUserDefaultUILanguage.KERNEL32(?,USER,?,SYSTEM,?,INSTALL), ref: 0041F281
                                                          • SetThreadLocale.KERNEL32(?,?,?,00000000,?,00000000,0042FDF8,000000FF,0042017D,?,?), ref: 0041F2E1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Language$DefaultLibrary$SystemThread$AddressCharFreeLoadProcUpper$Exception@8LocaleThrowUser_malloc_swscanf
                                                          • String ID: GetSystemPreferredUILanguages$INSTALL$Kernel32.dll$SYSTEM$USER
                                                          • API String ID: 2081102591-4030941638
                                                          • Opcode ID: d6552d0fb4520b339bd37c9dc8b8512f68942760f5bed1399b449c860eeb6083
                                                          • Instruction ID: 298e183df9084cad5458aef8e4b5078e0dc32087b97a83fc7525aa864e930c3c
                                                          • Opcode Fuzzy Hash: d6552d0fb4520b339bd37c9dc8b8512f68942760f5bed1399b449c860eeb6083
                                                          • Instruction Fuzzy Hash: 4051F3725043409BC3149FA4DC85AABB3F5BB88314F50093EFA9697280D77DE94ACB5A

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1325 40b1d0-40b219 1326 40b223-40b237 1325->1326 1327 40b21b-40b220 1325->1327 1328 40b242-40b244 1326->1328 1329 40b239-40b23f 1326->1329 1327->1326 1330 40b246-40b24c 1328->1330 1331 40b25d-40b27d 1328->1331 1329->1328 1332 40b256-40b258 1330->1332 1333 40b24e-40b253 1330->1333 1334 40b280-40b282 1331->1334 1337 40baa2-40bab6 1332->1337 1333->1332 1335 40b288-40b28a 1334->1335 1336 40b409-40b41d call 41c380 1334->1336 1338 40b292-40b2a4 1335->1338 1339 40b28c-40b28f 1335->1339 1344 40b43f-40b48f call 409090 call 421ecb 1336->1344 1345 40b41f-40b43a call 40bb70 1336->1345 1340 40b2a6-40b2e3 call 40b120 call 40bc00 call 421dee 1338->1340 1341 40b2fa-40b2fe 1338->1341 1339->1338 1360 40b2e6-40b2f8 1340->1360 1346 40b310-40b38e call 40bc00 call 421dee call 40b000 1341->1346 1347 40b300-40b30a 1341->1347 1371 40b491-40b49f call 42d9e5 1344->1371 1372 40b4a4-40b4e6 1344->1372 1345->1337 1352 40b391-40b3ad 1346->1352 1347->1346 1347->1352 1356 40b3b0-40b3ba 1352->1356 1359 40b3c0-40b3cc 1356->1359 1356->1360 1364 40b3f1-40b407 1359->1364 1365 40b3ce-40b3d6 1359->1365 1360->1334 1364->1356 1369 40b3d8-40b3dd 1365->1369 1370 40b3df-40b3e2 1365->1370 1376 40b3e9-40b3ec call 4051f0 1369->1376 1370->1376 1377 40b3e4 1370->1377 1371->1372 1382 40b4f2-40b502 1372->1382 1383 40b4e8-40b4f0 1372->1383 1376->1364 1377->1376 1387 40b504-40b509 1382->1387 1388 40b50c-40b528 1382->1388 1383->1382 1387->1388 1390 40b530-40b556 call 414f60 1388->1390 1392 40b5c2-40b5c5 1390->1392 1393 40b558-40b561 1390->1393 1394 40b611-40b637 call 421ecb 1392->1394 1395 40b5c7-40b5d0 1392->1395 1396 40b563-40b568 1393->1396 1397 40b56b-40b581 call 40a9c0 1393->1397 1405 40b639-40b647 call 42d9e5 1394->1405 1406 40b64c-40b667 call 40c030 1394->1406 1398 40b5d2-40b5d7 1395->1398 1399 40b5da-40b600 call 40bb00 call 40bb70 1395->1399 1396->1397 1408 40b583-40b588 1397->1408 1409 40b58b-40b5b1 call 409100 call 40bb70 1397->1409 1398->1399 1419 40b602-40b605 1399->1419 1420 40b60a-40b60c 1399->1420 1405->1406 1417 40b671-40b680 1406->1417 1418 40b669-40b66e 1406->1418 1408->1409 1427 40b5b3-40b5b6 1409->1427 1428 40b5bb-40b5bd 1409->1428 1422 40b682-40b68b 1417->1422 1423 40b68e-40b6b0 1417->1423 1418->1417 1419->1420 1420->1337 1422->1423 1425 40b6b2-40b6b8 1423->1425 1426 40b6bd-40b6c2 1423->1426 1425->1426 1429 40b6c4-40b6c9 1426->1429 1430 40b6cc-40b6f3 call 40c2c0 1426->1430 1427->1428 1428->1337 1429->1430 1433 40b6f5-40b70a 1430->1433 1434 40b74c-40b74f 1430->1434 1441 40b714-40b73a call 40bb00 call 40bb70 1433->1441 1442 40b70c-40b70f 1433->1442 1435 40b751-40b75d 1434->1435 1436 40b762-40b7ba call 40b060 1434->1436 1443 40ba6f-40ba92 1435->1443 1444 40b7bc-40b7cc 1436->1444 1445 40b7cf-40b7ff call 409180 1436->1445 1457 40b744-40b747 1441->1457 1458 40b73c-40b741 1441->1458 1442->1441 1443->1390 1444->1445 1449 40b804-40b809 1445->1449 1451 40b8a6-40b8ac 1449->1451 1452 40b80f-40b821 call 40c4b0 1449->1452 1454 40b8b2-40b8c4 call 40c4b0 1451->1454 1455 40b949-40b94b 1451->1455 1467 40b823-40b825 1452->1467 1468 40b885-40b887 1452->1468 1463 40b8c6-40b8c8 1454->1463 1474 40b928-40b92a 1454->1474 1459 40b959-40b962 1455->1459 1460 40b94d-40b954 1455->1460 1457->1337 1458->1457 1464 40b964-40b976 call 40c4b0 1459->1464 1465 40b99d-40b9a9 1459->1465 1460->1463 1475 40b8d2-40b8e7 1463->1475 1476 40b8ca-40b8cd 1463->1476 1464->1463 1485 40b97c-40b97e 1464->1485 1477 40b9b3-40ba6a 1465->1477 1478 40b9ab-40b9ae 1465->1478 1469 40b827-40b82c 1467->1469 1470 40b82f-40b844 1467->1470 1471 40b891-40b8a1 1468->1471 1472 40b889-40b88e 1468->1472 1469->1470 1487 40b846-40b849 1470->1487 1488 40b84e-40b874 call 40bb00 call 40bb70 1470->1488 1471->1443 1472->1471 1480 40b934-40b944 1474->1480 1481 40b92c-40b931 1474->1481 1492 40b8f1-40b917 call 40bb00 call 40bb70 1475->1492 1493 40b8e9-40b8ee 1475->1493 1476->1475 1477->1443 1478->1477 1480->1443 1481->1480 1489 40b980-40b985 1485->1489 1490 40b988-40b998 1485->1490 1487->1488 1505 40b876-40b87b 1488->1505 1506 40b87e-40b880 1488->1506 1489->1490 1490->1443 1503 40b921-40b923 1492->1503 1504 40b919-40b91c 1492->1504 1493->1492 1503->1337 1504->1503 1505->1506 1506->1337
                                                          APIs
                                                            • Part of subcall function 004051F0: __CxxThrowException@8.LIBCMT ref: 00405214
                                                            • Part of subcall function 004051F0: __CxxThrowException@8.LIBCMT ref: 0040523E
                                                            • Part of subcall function 004051F0: __CxxThrowException@8.LIBCMT ref: 00405268
                                                          • _malloc.LIBCMT ref: 0040B483
                                                          • __CxxThrowException@8.LIBCMT ref: 0040B49F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$_malloc
                                                          • String ID:
                                                          • API String ID: 175252994-0
                                                          • Opcode ID: 27ae718cb246680f5c5d6bf1bb6c97d8e5902cdf4d9c3899dc96b8d455768ad1
                                                          • Instruction ID: 2e6abc30ca2aa20ae5f3f6fc0f68f379590f98e29c4b42247bfa53aa02dcf44d
                                                          • Opcode Fuzzy Hash: 27ae718cb246680f5c5d6bf1bb6c97d8e5902cdf4d9c3899dc96b8d455768ad1
                                                          • Instruction Fuzzy Hash: 3C627D71A00248DFCB10DF69C880B9EBBF5EF88304F14819AE849AB391D779ED45CB95
                                                          APIs
                                                          • FindClose.KERNEL32(?,537E08AE,?,?), ref: 00407E70
                                                          • FindFirstFileW.KERNELBASE(?,?,537E08AE,?,?), ref: 00407E8A
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00407EDE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Find$FileFirst$Close
                                                          • String ID:
                                                          • API String ID: 2810966245-0
                                                          • Opcode ID: 2262d13d9cd29b8ef9dcfccac33bfb97fc72ec8c8361f932944a4d878434cc8b
                                                          • Instruction ID: 6d9093d44a4d32a4fee55667aa604e93bb106650d9471b23b0a41932ce3bcc02
                                                          • Opcode Fuzzy Hash: 2262d13d9cd29b8ef9dcfccac33bfb97fc72ec8c8361f932944a4d878434cc8b
                                                          • Instruction Fuzzy Hash: C0316D71908742DFD710DF28D845B5BB7E4EF59320F100B2AE4A5972D0DB38A909CB9A
                                                          APIs
                                                          • GetVersion.KERNEL32(?,?,00420066), ref: 0041F323
                                                          • CoCreateInstance.OLE32 ref: 0041F34A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateInstanceVersion
                                                          • String ID:
                                                          • API String ID: 1462612201-0
                                                          • Opcode ID: 2178591d72f77ed9f68f1ba43183410802dbbc52281cb795d0c4d4a87dbbd7d5
                                                          • Instruction ID: 4119b896e90871d56b1c7fc6a18c68987ceef037eb140d8bc2a0f6e2bd03ebc3
                                                          • Opcode Fuzzy Hash: 2178591d72f77ed9f68f1ba43183410802dbbc52281cb795d0c4d4a87dbbd7d5
                                                          • Instruction Fuzzy Hash: F8010C70304205AFD700DF69CD85F5B77E8AF88B04F109829F458D72A0D7B8E949CB56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CharUpper
                                                          • String ID: Unknown error
                                                          • API String ID: 9403516-83687255
                                                          • Opcode ID: ad7bf46e3de6b7f21405f684f1ccac249f2d2889590892a53ac2a03263f299c4
                                                          • Instruction ID: 207171b60f41956f4efded5058e7d1de725f9a258d7fd4d3ab9f449e565e6028
                                                          • Opcode Fuzzy Hash: ad7bf46e3de6b7f21405f684f1ccac249f2d2889590892a53ac2a03263f299c4
                                                          • Instruction Fuzzy Hash: 052258756083808FC324DF69C884A9BBBE5BF89304F64891EF69587351CB39E845CF96

                                                          Control-flow Graph

                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041B9F4
                                                          • LoadIconW.USER32(00400000,?), ref: 0041BA16
                                                          • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041BA28
                                                          • SetTimer.USER32(?,00000003,00000064,00000000), ref: 0041BA37
                                                          • SetWindowTextW.USER32(?,?), ref: 0041BA48
                                                          • PostMessageW.USER32(?,00008000,00000000,00000000), ref: 0041BA5E
                                                          • SetDlgItemTextW.USER32(?,000003E7,?), ref: 0041BABD
                                                          • SetDlgItemTextW.USER32(?,00000002,?), ref: 0041BB18
                                                          • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041BB2D
                                                          • SetEvent.KERNEL32 ref: 0041BB3B
                                                          • GetLastError.KERNEL32 ref: 0041BB45
                                                          • GetWindowRect.USER32(?,?), ref: 0041BB74
                                                          • GetWindowRect.USER32(?,?), ref: 0041BB91
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0041BBC6
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0041BC38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ErrorEventIconInfoLastLoadMoveParametersPostSystemTimer
                                                          • String ID:
                                                          • API String ID: 4208242464-0
                                                          • Opcode ID: 213527b756d3c871117873a44ecb0c9c645d7508d353441342c7c43678ba1636
                                                          • Instruction ID: d4708a701f4d74b9302c6a0546dacd2ca318cb66cb684dddc2989582ad0f470f
                                                          • Opcode Fuzzy Hash: 213527b756d3c871117873a44ecb0c9c645d7508d353441342c7c43678ba1636
                                                          • Instruction Fuzzy Hash: 589157B1608344AFD710DF69D984A5BBBE8EF88704F404A2EF988D7390D7B4D940CB96

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 930 422b09-422b18 931 422b41 930->931 932 422b1a-422b26 930->932 934 422b44-422b50 call 422df3 931->934 932->931 933 422b28-422b2f 932->933 933->931 935 422b31-422b3f 933->935 938 422b52-422b59 call 422ab1 934->938 939 422b5a-422b61 call 42469a 934->939 935->934 938->939 944 422b63-422b6a call 422ab1 939->944 945 422b6b-422b7a call 427355 call 427101 939->945 944->945 952 422b84-422ba0 GetCommandLineA call 426fca call 426f0f 945->952 953 422b7c-422b83 call 423cbc 945->953 960 422ba2-422ba9 call 423cbc 952->960 961 422baa-422bb1 call 426c97 952->961 953->952 960->961 966 422bb3-422bba call 423cbc 961->966 967 422bbb-422bc4 call 423d7b 961->967 966->967 972 422bc6-422bcc call 423cbc 967->972 973 422bcd-422bd5 call 426c38 967->973 972->973 978 422bd7-422bdb 973->978 979 422bdd-422bdf 973->979 980 422be0-422bf3 call 41ff60 978->980 979->980 983 422bf5-422bf6 call 423f2c 980->983 984 422bfb-422c57 call 423f58 call 423add 980->984 983->984
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__mtinit__setargv__setenvp__wincmdln
                                                          • String ID:
                                                          • API String ID: 3545360858-0
                                                          • Opcode ID: 1bbe4d6a2c1f83ef58cbfe54f8c5cc5bedf82d33bd6d22c311cede4537bf217c
                                                          • Instruction ID: 59fed90c4ca1eede3bb5b7934065d88dc15ceb01ae7c2db383fc00aafbe58fe6
                                                          • Opcode Fuzzy Hash: 1bbe4d6a2c1f83ef58cbfe54f8c5cc5bedf82d33bd6d22c311cede4537bf217c
                                                          • Instruction Fuzzy Hash: C421A270B00335A9DB147F72BA52B6E2674AF00709FD0442FF805AA292EAFCD942961C

                                                          Control-flow Graph

                                                          APIs
                                                          • _memset.LIBCMT ref: 0041F70C
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0041F723
                                                          • _memset.LIBCMT ref: 0041F73B
                                                          • _wcsrchr.LIBCMT ref: 0041F75E
                                                          • RegCreateKeyExW.KERNELBASE ref: 0041F79F
                                                          • RegSetValueExW.KERNELBASE(00000000,IsHostApp,00000000,00000001,00000000,00000002), ref: 0041F7BF
                                                          • RegCloseKey.ADVAPI32 ref: 0041F7C9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateFileModuleNameValue_wcsrchr
                                                          • String ID: Applications\$IsHostApp
                                                          • API String ID: 1474337858-1667566961
                                                          • Opcode ID: cff6f790a36eb52c656df31ff0c4e9f8bf1fe657cd444f3676a6b9194cf5c507
                                                          • Instruction ID: b4fefd4a986ce641184e98d9e04d4cd0ee7292d218086c9f430e2e44724af58e
                                                          • Opcode Fuzzy Hash: cff6f790a36eb52c656df31ff0c4e9f8bf1fe657cd444f3676a6b9194cf5c507
                                                          • Instruction Fuzzy Hash: 2E2165B1654300BAE224EB60DD47FEB73A8AF98B04F40491DB3459A1C1DAB4A544C79A

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1005 41d740-41d76c CreateDialogParamW 1006 41d771-41d791 call 408600 call 41c040 1005->1006 1007 41d76e 1005->1007 1012 41d793-41d79a 1006->1012 1013 41d7ab-41d7b9 1006->1013 1007->1006 1012->1013 1016 41d79c-41d7a5 ShowWindow 1012->1016 1014 41d7c3 1013->1014 1015 41d7bb-41d7c1 1013->1015 1017 41d7c5-41d846 call 404bf0 DialogBoxParamW WaitForSingleObject call 41b1d0 SetWindowTextW call 421dee ShowWindow WaitForSingleObject 1014->1017 1015->1017 1016->1013
                                                          APIs
                                                          • CreateDialogParamW.USER32(00400000,000001F6,00000000,Function_000063F0,?), ref: 0041D764
                                                          • ShowWindow.USER32(?,00000001,?,setup.bmp), ref: 0041D7A5
                                                          • DialogBoxParamW.USER32(00400000,000001F4,00000000,Function_000063F0,?), ref: 0041D7EB
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,setup.bmp), ref: 0041D800
                                                          • SetWindowTextW.USER32(?,?), ref: 0041D817
                                                          • ShowWindow.USER32(?,00000001), ref: 0041D830
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D83B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Window$DialogObjectParamShowSingleWait$CreateText
                                                          • String ID: setup.bmp
                                                          • API String ID: 2497262453-2262724209
                                                          • Opcode ID: d8c619cd4cecbc0b145774af9c6c06f338f744dbb22830f04e4e83a9de6a6ac1
                                                          • Instruction ID: 0faa20cbb3d567336509cef9e5aebf815778aaddbabd9f03ba19637f0d8d8adc
                                                          • Opcode Fuzzy Hash: d8c619cd4cecbc0b145774af9c6c06f338f744dbb22830f04e4e83a9de6a6ac1
                                                          • Instruction Fuzzy Hash: EF313172640305AFC720EF24DD81FDB37A4EB49310F20062AFA54672D1CB74E805CBA9

                                                          Control-flow Graph

                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00008010), ref: 0041C058
                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 0041C085
                                                          • SendMessageW.USER32(?,00000172,00000000,?), ref: 0041C09A
                                                          • MoveWindow.USER32(?,00000000,00000000,?,?,00000001), ref: 0041C0BA
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0041C0D7
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0041C13D
                                                          • AdjustWindowRect.USER32(?,00000000), ref: 0041C149
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0041C16D
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Window$Move$AdjustErrorFreeHeapImageInfoLastLoadLongMessageObjectParametersRectSendSystem___sbh_find_block___sbh_free_block__lock
                                                          • String ID:
                                                          • API String ID: 3689589546-0
                                                          • Opcode ID: 7bfc0ae8c63c3b13bb5f29ca599eb26561b13572ec439ebf92d2744aaab055c0
                                                          • Instruction ID: 10272e37aad25a8ad928242f2c0e3e8038a1b118f2e72c0a5f5bbb975411cee3
                                                          • Opcode Fuzzy Hash: 7bfc0ae8c63c3b13bb5f29ca599eb26561b13572ec439ebf92d2744aaab055c0
                                                          • Instruction Fuzzy Hash: E7412AB1604300AFD354CF38DD85F6BBBE9EBC8710F545A2DB989C7290D671E9088B66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1031 422013-42202b call 4242f5 call 4242ef call 4242d5 1038 422057-42206d call 4244fd 1031->1038 1039 42202d-42203e call 4242ef call 424329 1031->1039 1042 422072-422079 1038->1042 1051 422040-422047 GetLastError ExitThread 1039->1051 1052 42204d-422055 GetCurrentThreadId 1039->1052 1044 422090-422095 call 421fd2 1042->1044 1045 42207b-422088 call 4248c0 1042->1045 1045->1044 1054 42208a 1045->1054 1052->1042 1054->1044
                                                          APIs
                                                          • ___set_flsgetvalue.LIBCMT ref: 00422019
                                                            • Part of subcall function 004242F5: TlsGetValue.KERNEL32(?,0042201E), ref: 004242FE
                                                            • Part of subcall function 004242F5: __decode_pointer.LIBCMT ref: 00424310
                                                            • Part of subcall function 004242F5: TlsSetValue.KERNEL32(00000000,0042201E), ref: 0042431F
                                                          • ___fls_getvalue@4.LIBCMT ref: 00422024
                                                            • Part of subcall function 004242D5: TlsGetValue.KERNEL32(?,?,00422029,00000000), ref: 004242E3
                                                          • ___fls_setvalue@8.LIBCMT ref: 00422037
                                                            • Part of subcall function 00424329: __decode_pointer.LIBCMT ref: 0042433A
                                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00422040
                                                          • ExitThread.KERNEL32 ref: 00422047
                                                          • GetCurrentThreadId.KERNEL32 ref: 0042204D
                                                          • __freefls@4.LIBCMT ref: 0042206D
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00422080
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                          • String ID:
                                                          • API String ID: 1925773019-0
                                                          • Opcode ID: 72ddbad82ef0f2b195670e724972f924a497b3df3b9b3875832c963032e7b329
                                                          • Instruction ID: cba3c34129614957de2666b5bd55052eb0b4080e267b2a8cfe39401b396168e4
                                                          • Opcode Fuzzy Hash: 72ddbad82ef0f2b195670e724972f924a497b3df3b9b3875832c963032e7b329
                                                          • Instruction Fuzzy Hash: 8001A074300221FBD714BF73FA4990A3769EF45344791405AF50587622CBBCD846C66D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1055 41e050-41e1aa call 41e510 call 41b1d0 call 404bf0 call 421dee call 41b1d0 call 404bf0 call 421dee call 41b1d0 call 404bf0 call 421dee call 41b1d0 call 404bf0 call 421dee call 404bf0 * 2 call 421ecb 1088 41e1ac-41e1ba call 42d9e5 1055->1088 1089 41e1bf-41e1e0 call 41d850 1055->1089 1088->1089 1093 41e1e2-41e1e7 1089->1093 1094 41e1ea-41e1f0 1089->1094 1093->1094 1095 41e1f2-41e1f7 1094->1095 1096 41e1fa-41e236 call 404bf0 1094->1096 1095->1096 1099 41e44c-41e451 call 41dd70 1096->1099 1100 41e23c-41e24d call 41db40 1096->1100 1104 41e456-41e466 1099->1104 1100->1104 1107 41e253-41e27c 1100->1107 1105 41e468-41e47d 1104->1105 1106 41e4ab-41e4ae 1104->1106 1108 41e485-41e48e 1105->1108 1109 41e47f-41e480 call 404e70 1105->1109 1110 41e4c1-41e4df 1106->1110 1111 41e4b0-41e4bc call 404bf0 1106->1111 1117 41e360-41e367 1107->1117 1118 41e282-41e2a6 call 408740 1107->1118 1113 41e490-41e49f 1108->1113 1109->1108 1115 41e4e0-41e50b call 41e5d0 1110->1115 1111->1110 1113->1113 1119 41e4a1-41e4a8 1113->1119 1117->1104 1121 41e36d-41e39b call 422096 1117->1121 1123 41e2a8-41e2ca call 404b30 1118->1123 1119->1106 1128 41e3b8-41e418 call 404e70 call 41b1d0 call 404bf0 call 421dee call 41d740 1121->1128 1129 41e39d-41e3a7 GetLastError 1121->1129 1131 41e2e7-41e2ea 1123->1131 1132 41e2cc 1123->1132 1159 41e41d-41e442 call 421dee CloseHandle 1128->1159 1133 41e3a9 1129->1133 1134 41e3ae-41e3b3 1129->1134 1137 41e2f5-41e309 call 421dee 1131->1137 1136 41e2cf 1132->1136 1133->1134 1134->1115 1139 41e2d1-41e2d4 1136->1139 1140 41e2ec-41e2f1 1136->1140 1147 41e330-41e359 call 408890 1137->1147 1148 41e30b-41e328 call 408890 1137->1148 1143 41e2f3 1139->1143 1144 41e2d6-41e2e5 1139->1144 1140->1137 1143->1137 1144->1131 1144->1136 1157 41e35e 1147->1157 1148->1118 1154 41e32e 1148->1154 1154->1157 1157->1117 1159->1104 1162 41e444-41e44a GetLastError 1159->1162 1162->1104
                                                          APIs
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          • _malloc.LIBCMT ref: 0041E1A0
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 0041E1BA
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          • CloseHandle.KERNEL32(00000000,?,00000004,?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041E43A
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041E444
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041E39D
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 0041D740: CreateDialogParamW.USER32(00400000,000001F6,00000000,Function_000063F0,?), ref: 0041D764
                                                            • Part of subcall function 0041D740: ShowWindow.USER32(?,00000001,?,setup.bmp), ref: 0041D7A5
                                                            • Part of subcall function 0041D740: DialogBoxParamW.USER32(00400000,000001F4,00000000,Function_000063F0,?), ref: 0041D7EB
                                                            • Part of subcall function 0041D740: WaitForSingleObject.KERNEL32(?,000000FF,?,setup.bmp), ref: 0041D800
                                                            • Part of subcall function 0041D740: SetWindowTextW.USER32(?,?), ref: 0041D817
                                                            • Part of subcall function 0041D740: ShowWindow.USER32(?,00000001), ref: 0041D830
                                                            • Part of subcall function 0041D740: WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D83B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastWindow$DialogException@8HeapObjectParamShowSingleThrowWait_malloc$AllocateCloseCreateExceptionFreeHandleRaiseText___sbh_find_block___sbh_free_block__lock
                                                          • String ID: etup.bmp
                                                          • API String ID: 108091135-3436927654
                                                          • Opcode ID: 9d215bae1c5d9e1a63466686c8b5942799d0021b491904e95ddcade9e571659f
                                                          • Instruction ID: 5d8bd30ac3cac1c9bf74f9187621e21ec3f781addd92d798ee7c0fa51436409c
                                                          • Opcode Fuzzy Hash: 9d215bae1c5d9e1a63466686c8b5942799d0021b491904e95ddcade9e571659f
                                                          • Instruction Fuzzy Hash: 2FD1A2755083808FC320EF69C880B9BB7E5AF98304F14892EF99987351D738E949CB5B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1164 422096-4220a8 1165 4220c6-4220de call 4242f5 call 424b23 1164->1165 1166 4220aa-4220c4 call 422daa call 424d46 1164->1166 1176 4220e0-422102 call 4244e3 call 424383 1165->1176 1177 42212a-422134 call 421dee 1165->1177 1175 422142-422145 1166->1175 1189 422107-42211f CreateThread 1176->1189 1190 422104 1176->1190 1182 422136-42213e call 422dd0 1177->1182 1183 42213f 1177->1183 1182->1183 1186 422141 1183->1186 1186->1175 1189->1186 1191 422121-422127 GetLastError 1189->1191 1190->1189 1191->1177
                                                          APIs
                                                          • ___set_flsgetvalue.LIBCMT ref: 004220C7
                                                          • __calloc_crt.LIBCMT ref: 004220D3
                                                          • __getptd.LIBCMT ref: 004220E0
                                                          • __initptd.LIBCMT ref: 004220E9
                                                          • CreateThread.KERNELBASE(?,?,00422013,00000000,?,?), ref: 00422117
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00422121
                                                          • __dosmaperr.LIBCMT ref: 00422139
                                                            • Part of subcall function 00422DAA: __getptd_noexit.LIBCMT ref: 00422DAA
                                                            • Part of subcall function 00424D46: __decode_pointer.LIBCMT ref: 00424D51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit__initptd
                                                          • String ID:
                                                          • API String ID: 3358092440-0
                                                          • Opcode ID: 9c57268307c565641c923fb345878c67bd9b12d9a912a9a38e2ad430a80a8677
                                                          • Instruction ID: fb74a56c9f60d37d37198afcb2bea95722bf172271e528f26766c8b543eded33
                                                          • Opcode Fuzzy Hash: 9c57268307c565641c923fb345878c67bd9b12d9a912a9a38e2ad430a80a8677
                                                          • Instruction Fuzzy Hash: 80110872700225BFCB10BFA5FD829AF77A5EF44324B90002FF60493151DBF99950D6A8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1192 41f7f0-41f867 call 42bdf0 call 4083b0 1197 41f886-41f890 1192->1197 1198 41f869-41f876 1192->1198 1201 41f892-41f89a 1197->1201 1202 41f89c-41f8a8 1197->1202 1199 41f878-41f879 CloseHandle 1198->1199 1200 41f87f-41f881 1198->1200 1199->1200 1203 41fabe-41fae5 call 421ddf 1200->1203 1201->1201 1201->1202 1204 41f8aa 1202->1204 1205 41f8be-41f8cb 1202->1205 1206 41f8b0-41f8b8 1204->1206 1207 41f8d3-41f8ef call 408520 1205->1207 1206->1206 1209 41f8ba 1206->1209 1207->1198 1213 41f8f5-41f8fb 1207->1213 1209->1205 1214 41f901-41f90d 1213->1214 1215 41fa6f-41fa7c 1213->1215 1216 41f910-41f91b 1214->1216 1217 41fab3 1215->1217 1218 41f921-41f929 1216->1218 1219 41f9ab-41f9af 1216->1219 1220 41fab5-41fab6 CloseHandle 1217->1220 1221 41fabc 1217->1221 1223 41fa0d-41fa35 call 4221a0 1218->1223 1224 41f92f-41f939 1218->1224 1222 41f9b1-41f9bd 1219->1222 1219->1223 1220->1221 1221->1203 1225 41f9d4-41f9d6 1222->1225 1226 41f9bf 1222->1226 1237 41fa45-41fa62 1223->1237 1238 41fa37-41fa3f 1223->1238 1227 41f954-41f956 1224->1227 1228 41f93b 1224->1228 1232 41f9d8-41f9dc 1225->1232 1233 41f9ff-41fa08 1225->1233 1230 41f9c0-41f9c4 1226->1230 1234 41faa1-41fab0 1227->1234 1235 41f95c-41f960 1227->1235 1231 41f940-41f944 1228->1231 1239 41f9c6-41f9d2 1230->1239 1240 41f9f8-41f9fa 1230->1240 1241 41f946-41f952 1231->1241 1242 41f988-41f990 1231->1242 1232->1240 1243 41f9de-41f9e1 1232->1243 1233->1216 1234->1217 1235->1242 1244 41f962-41f965 1235->1244 1246 41fa64-41fa65 CloseHandle 1237->1246 1247 41fa6b-41fa6d 1237->1247 1238->1237 1245 41f8d0 1238->1245 1239->1225 1239->1230 1240->1216 1241->1227 1241->1231 1250 41f996-41f9a6 call 406070 1242->1250 1251 41fa7e-41fa90 1242->1251 1243->1233 1248 41f9e3-41f9e9 1243->1248 1244->1234 1249 41f96b-41f971 1244->1249 1245->1207 1246->1247 1247->1203 1248->1240 1253 41f9eb-41f9ee 1248->1253 1249->1242 1254 41f973-41f976 1249->1254 1250->1216 1251->1200 1252 41fa96-41fa9f CloseHandle 1251->1252 1252->1203 1253->1233 1256 41f9f0-41f9f6 1253->1256 1254->1234 1257 41f97c-41f982 1254->1257 1256->1233 1256->1240 1257->1234 1257->1242
                                                          APIs
                                                            • Part of subcall function 004083B0: CloseHandle.KERNEL32(?,537E08AE,00000000,?,80000000,00000001,00000000), ref: 004083DD
                                                            • Part of subcall function 004083B0: CreateFileW.KERNELBASE(?,?,?,00000000,00000003,00000080,00000000,537E08AE,00000000,?,80000000,00000001,00000000), ref: 00408410
                                                            • Part of subcall function 004083B0: CreateFileW.KERNEL32(?,?,?,00000000,00000003,00000080,00000000), ref: 0040846E
                                                          • CloseHandle.KERNEL32(?,?,00001000,?,80000000,00000001,537E08AE,?,?,?,00000004,00000000,0043092B,000000FF,004205FF,?), ref: 0041F879
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateFileHandle
                                                          • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                                          • API String ID: 3498533004-372238525
                                                          • Opcode ID: 91f2affea4869e83765d2e1f74f89e94a0244e6f1a37536b6162920d4a1ac00b
                                                          • Instruction ID: 1b5d8e8219d8dbe746f9698ee4f6a7a213231ea35f70ff9d4cceb37c5f899a79
                                                          • Opcode Fuzzy Hash: 91f2affea4869e83765d2e1f74f89e94a0244e6f1a37536b6162920d4a1ac00b
                                                          • Instruction Fuzzy Hash: E781D4B15083809BD325DF2485807EBBBE1AF95354F244A3EE5D987281D73AD88FCB49

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1259 4070d0-407106 DeleteFileW 1260 407181-407183 1259->1260 1261 407108-407112 call 407070 1259->1261 1263 4071fa-40720d 1260->1263 1265 407114-40711f call 406a10 1261->1265 1266 407125-40712a DeleteFileW 1261->1266 1265->1266 1271 4071f8 1265->1271 1266->1260 1267 40712c-407154 call 404e70 call 4081c0 1266->1267 1275 4071e3-4071ef 1267->1275 1276 40715a-407163 1267->1276 1271->1263 1278 4071f0-4071f5 call 421dee 1275->1278 1276->1275 1277 407165-40716e DeleteFileW 1276->1277 1279 407170-40717e call 421dee 1277->1279 1280 407185-40718f call 407070 1277->1280 1278->1271 1279->1260 1287 407191-40719c call 406a10 1280->1287 1288 4071ab-4071b1 DeleteFileW 1280->1288 1295 4071a9 1287->1295 1296 40719e-4071a7 1287->1296 1290 4071b3-4071c5 call 421dee 1288->1290 1291 4071c7-4071e1 DeleteFileW call 421dee 1288->1291 1290->1263 1291->1263 1295->1288 1296->1278
                                                          APIs
                                                          • DeleteFileW.KERNELBASE(?,537E08AE,?,?,?,00000000,537E08AE,?,00000000), ref: 00407102
                                                            • Part of subcall function 00407070: CreateFileW.KERNEL32(?,00000000,00000007,00000000,00000003,00000080,00000000), ref: 00407084
                                                            • Part of subcall function 00407070: _memset.LIBCMT ref: 0040709A
                                                            • Part of subcall function 00407070: GetFileInformationByHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0040710F), ref: 004070A8
                                                            • Part of subcall function 00407070: CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,0040710F), ref: 004070B3
                                                          • DeleteFileW.KERNEL32(?,?,?,00000000,537E08AE,?,00000000), ref: 00407126
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,?,?,00000000,537E08AE,?,00000000), ref: 0040716A
                                                            • Part of subcall function 00406A10: SetFileAttributesW.KERNELBASE(?,00000000,537E08AE,?,?,00000000,00430508,000000FF,00407419), ref: 00406A40
                                                          • DeleteFileW.KERNEL32(?,?,?,00000000,537E08AE,?,00000000), ref: 004071AC
                                                          • DeleteFileW.KERNEL32(?,?,?,00000000,537E08AE,?,00000000), ref: 004071C7
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Handle$AttributesCloseCreateErrorFreeHeapInformationLast___sbh_find_block___sbh_free_block__lock_memset
                                                          • String ID:
                                                          • API String ID: 3115853615-0
                                                          • Opcode ID: bfb8be93367b1f7e134295210bed3b2619c59b7c9f56f090842b6278bde08a63
                                                          • Instruction ID: ca44fddab62255b2f7870df1ed14c1733f6fd0f03786bcee7d5bc91ed6090572
                                                          • Opcode Fuzzy Hash: bfb8be93367b1f7e134295210bed3b2619c59b7c9f56f090842b6278bde08a63
                                                          • Instruction Fuzzy Hash: 71310771A083419BC610AB265C40A5B7798AF95324F10073FF865BB3D1DB3CE906CA5B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1299 421dee-421dff call 423a98 1302 421e01-421e08 1299->1302 1303 421e76-421e7b call 423add 1299->1303 1304 421e0a-421e22 call 422f9f call 422fd2 1302->1304 1305 421e4d 1302->1305 1317 421e24-421e2c call 423002 1304->1317 1318 421e2d-421e3d call 421e44 1304->1318 1307 421e4e-421e5e RtlFreeHeap 1305->1307 1307->1303 1310 421e60-421e75 call 422daa GetLastError call 422d68 1307->1310 1310->1303 1317->1318 1318->1303 1324 421e3f-421e42 1318->1324 1324->1307
                                                          APIs
                                                          • __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00422F9F: __mtinitlocknum.LIBCMT ref: 00422FB5
                                                            • Part of subcall function 00422F9F: __amsg_exit.LIBCMT ref: 00422FC1
                                                            • Part of subcall function 00422F9F: EnterCriticalSection.KERNEL32(?,?,?,0042458E,0000000D,00437C60,00000008,00422072,?,00000000), ref: 00422FC9
                                                          • ___sbh_find_block.LIBCMT ref: 00421E17
                                                          • ___sbh_free_block.LIBCMT ref: 00421E26
                                                          • RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                          • GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                          • String ID:
                                                          • API String ID: 2714421763-0
                                                          • Opcode ID: c8934a7c4923efb6ac1c1572ab7c9cc304ace5cc8a043a7b62b6768359b908ef
                                                          • Instruction ID: 36df9ecf480f3c232eb00c3d22aa6e4bf98602e55d40a7a541d3ce7ea1edb9de
                                                          • Opcode Fuzzy Hash: c8934a7c4923efb6ac1c1572ab7c9cc304ace5cc8a043a7b62b6768359b908ef
                                                          • Instruction Fuzzy Hash: DD018471B05335AAEB206F71BD0AB5F3674AF21328FD1411FF940A6191CABC99418B9C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1509 40fd80-40ff87 call 40fa50 call 409090 1514 410196-4101bc call 40a9c0 1509->1514 1515 40ff8d-40ff9b 1509->1515 1520 4101c6-410394 call 409100 call 421dee * 4 call 40d610 call 421dee * 3 1514->1520 1521 4101be-4101c3 1514->1521 1516 40ffa6-410002 call 411e60 call 421dee call 40b000 1515->1516 1531 4103b2 call 40e0c0 1516->1531 1532 410008-41000a 1516->1532 1608 410396-4103af 1520->1608 1521->1520 1536 4103b7-4103c7 call 42d9e5 1531->1536 1532->1531 1535 410010-410013 1532->1535 1537 410015-410017 1535->1537 1538 41005d-41006d call 421ecb 1535->1538 1544 4103cc-4103dc call 42d9e5 1536->1544 1542 410049 1537->1542 1543 410019-410024 call 421ecb 1537->1543 1538->1544 1551 410073-410082 1538->1551 1545 41004b-41005a call 421dee 1542->1545 1543->1536 1556 41002a-410031 1543->1556 1554 4103e1-4105c9 call 40bb00 call 421dee * 4 call 40d610 call 421dee * 3 1544->1554 1545->1538 1557 41008b-4100e5 call 409180 1551->1557 1554->1608 1556->1545 1559 410033-410035 1556->1559 1568 4100ea-4100f3 1557->1568 1560 410037 1559->1560 1561 410039-410047 call 4221a0 1559->1561 1560->1561 1561->1545 1568->1554 1569 4100f9-410100 1568->1569 1572 410102-410124 1569->1572 1573 41012a-410133 1569->1573 1572->1531 1572->1573 1576 410135 1573->1576 1577 41016e-41018e 1573->1577 1581 410140-410165 1576->1581 1577->1516 1588 410194 1577->1588 1581->1581 1584 410167 1581->1584 1584->1577 1588->1514
                                                          APIs
                                                            • Part of subcall function 00411E60: _malloc.LIBCMT ref: 00411E86
                                                            • Part of subcall function 00411E60: __CxxThrowException@8.LIBCMT ref: 00411EA6
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          • _malloc.LIBCMT ref: 0041001A
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • _malloc.LIBCMT ref: 0041005F
                                                          • __CxxThrowException@8.LIBCMT ref: 004103C7
                                                          • __CxxThrowException@8.LIBCMT ref: 004103DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw_malloc$Heap$AllocateErrorFreeLast___sbh_find_block___sbh_free_block__lock
                                                          • String ID:
                                                          • API String ID: 692529005-0
                                                          • Opcode ID: 30c8d6273c1f0815a2eb9915eecc83b390c54e5ece629dd8823cc2c1d9aba3a5
                                                          • Instruction ID: 56e3bafea64fc53d2df5d5e03e911840bc184fe3c7d80c36f6e752c328ae0f0a
                                                          • Opcode Fuzzy Hash: 30c8d6273c1f0815a2eb9915eecc83b390c54e5ece629dd8823cc2c1d9aba3a5
                                                          • Instruction Fuzzy Hash: DB32D2B5908380DFD320CF6AC880B9BFBE4BFD9304F54892EE58987251DB79A544CB56

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1619 415a80-415ab0 1620 415ab6-415aba 1619->1620 1621 415f9d-415fb4 1619->1621 1620->1621 1622 415ac0-415ad3 call 414ac0 1620->1622 1625 415ad5-415aec 1622->1625 1626 415aef-415aff call 414ac0 1622->1626 1626->1625 1629 415b01-415b11 call 414ac0 1626->1629 1629->1625 1632 415b13-415b23 call 414ac0 1629->1632 1632->1625 1635 415b25-415b3a call 414d50 1632->1635 1635->1625 1638 415b3c-415b88 call 414b30 * 3 1635->1638 1645 415b92-415b9a 1638->1645 1646 415b8a-415b8f 1638->1646 1647 415ba4-415bb6 1645->1647 1648 415b9c-415ba1 1645->1648 1646->1645 1649 415bc4-415bcc 1647->1649 1650 415bb8-415bc0 1647->1650 1648->1647 1651 415bda-415c4e call 415740 1649->1651 1652 415bce-415bd6 1649->1652 1650->1649 1657 415c56-415c5e 1651->1657 1652->1651 1658 415c60-415c65 1657->1658 1659 415c93 1657->1659 1658->1659 1661 415c67-415c83 call 414dc0 call 414f60 1658->1661 1660 415c95-415c9e 1659->1660 1663 415ca0-415ca9 call 414b50 1660->1663 1664 415cb2-415cd0 1660->1664 1675 415c85-415c89 1661->1675 1677 415edf-415ee5 1663->1677 1678 415caf 1663->1678 1667 415cd2-415cd4 call 414e80 1664->1667 1668 415cdd-415ce5 1664->1668 1679 415cd9 1667->1679 1669 415d05-415d0f 1668->1669 1670 415ce7-415cec 1668->1670 1669->1657 1676 415d15-415d17 1669->1676 1673 415cf8-415d03 1670->1673 1674 415cee-415cf6 1670->1674 1673->1660 1673->1669 1674->1669 1674->1673 1680 415ebb-415edc call 4157a0 1675->1680 1681 415c8f 1675->1681 1682 415d20-415d2d 1676->1682 1683 415d19-415d1e 1676->1683 1684 415ee7-415ee9 call 414df0 1677->1684 1685 415efa 1677->1685 1678->1664 1679->1668 1681->1659 1687 415d2f-415d41 call 416080 1682->1687 1683->1687 1692 415eee-415ef0 1684->1692 1689 415efc-415f20 call 4157a0 1685->1689 1698 415d47-415d4e 1687->1698 1699 415eae-415eb6 1687->1699 1695 415f23-415f25 1692->1695 1696 415ef2-415ef8 1692->1696 1695->1689 1696->1684 1696->1685 1700 415d50-415d53 1698->1700 1701 415d55 1698->1701 1699->1657 1702 415d58 1700->1702 1701->1702 1703 415d60-415d65 1702->1703 1704 415d74-415d8f 1703->1704 1705 415d67-415d6e call 414b50 1703->1705 1704->1703 1707 415d91-415daa 1704->1707 1705->1704 1711 415f27-415f4e call 4157a0 1705->1711 1709 415db3-415dcf 1707->1709 1710 415dac-415db1 1707->1710 1712 415df1-415e07 1709->1712 1713 415dd1-415dd4 1709->1713 1710->1709 1716 415e09-415e0c 1712->1716 1717 415e2b-415e41 1712->1717 1713->1712 1715 415dd6-415dd8 call 414df0 1713->1715 1724 415ddd-415ddf 1715->1724 1716->1717 1722 415e0e 1716->1722 1719 415e63-415e7b 1717->1719 1720 415e43-415e46 1717->1720 1725 415e9d-415ea9 1719->1725 1726 415e7d-415e80 1719->1726 1720->1719 1723 415e48-415e4a call 414df0 1720->1723 1727 415e10-415e12 call 414df0 1722->1727 1735 415e4f-415e51 1723->1735 1730 415f51-415f5f call 42d9e5 1724->1730 1731 415de5-415deb 1724->1731 1725->1657 1726->1725 1732 415e82-415e8b call 414df0 1726->1732 1733 415e17-415e19 1727->1733 1738 415f64-415f72 call 42d9e5 1730->1738 1731->1715 1736 415ded 1731->1736 1743 415e91-415e97 1732->1743 1744 415f8a-415f98 call 42d9e5 1732->1744 1733->1738 1739 415e1f-415e25 1733->1739 1740 415f77-415f85 call 42d9e5 1735->1740 1741 415e57-415e5d 1735->1741 1736->1712 1738->1740 1739->1727 1745 415e27 1739->1745 1740->1744 1741->1723 1748 415e5f 1741->1748 1743->1732 1749 415e99 1743->1749 1744->1621 1745->1717 1748->1719 1749->1725
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c22077e6261d0ce50dc2a4e52b14bd537c44690fc40115488985def5f82b3dc1
                                                          • Instruction ID: c83496670c431ab4ea79856a4b507278c9c29364285cad59d9c6f3676edfd229
                                                          • Opcode Fuzzy Hash: c22077e6261d0ce50dc2a4e52b14bd537c44690fc40115488985def5f82b3dc1
                                                          • Instruction Fuzzy Hash: 4C026E71604B40CFCB20DF29D480696B7E1FFC9314F148A5EE89A8B346D738E985CB99
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000003,00000000,00000003,02000000,00000000,537E08AE,00000004,?,?,?), ref: 00406962
                                                          • CreateFileW.KERNEL32(537E08AE,40000000,00000003,00000000,00000003,02000000,00000000,?,00000000,00000004), ref: 004069BA
                                                          • SetFileTime.KERNELBASE(00000000,00000000,00000000,?,?,40000000,00000003,00000000,00000003,02000000,00000000,537E08AE,00000004,?,?,?), ref: 004069E0
                                                          • CloseHandle.KERNEL32(00000000,?,40000000,00000003,00000000,00000003,02000000,00000000,537E08AE,00000004,?,?,?), ref: 004069EC
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 004081C0: GetCurrentDirectoryW.KERNEL32(00000105,537E08AE), ref: 004082B3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: File$Create$CloseCurrentDirectoryException@8HandleThrowTime_malloc
                                                          • String ID:
                                                          • API String ID: 122967144-0
                                                          • Opcode ID: 4abefc374c4680e747f2d68701bb1e162ba3d43bfcf2598988ba8f17a99620e7
                                                          • Instruction ID: b3999c9b89675ebd2ae71541746d99067d6c3b718fc365bd41268ac977983332
                                                          • Opcode Fuzzy Hash: 4abefc374c4680e747f2d68701bb1e162ba3d43bfcf2598988ba8f17a99620e7
                                                          • Instruction Fuzzy Hash: CE210A71244310BBE2209F25DC45F5B7BDCEB45B70F11062EF555A72D0C7789909CAA9
                                                          APIs
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00421FA8
                                                            • Part of subcall function 004248C0: __FindPESection.LIBCMT ref: 0042491B
                                                          • __getptd_noexit.LIBCMT ref: 00421FB8
                                                          • __freeptd.LIBCMT ref: 00421FC2
                                                          • ExitThread.KERNEL32 ref: 00421FCB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 3182216644-0
                                                          • Opcode ID: acf5ac546c9837852431c15dd70e16c76053a486527b636c9cb693f04e975d81
                                                          • Instruction ID: 75a8cb905a69bf016ed46b0df59a3a75953ea8d07fb7ab818117307767d24168
                                                          • Opcode Fuzzy Hash: acf5ac546c9837852431c15dd70e16c76053a486527b636c9cb693f04e975d81
                                                          • Instruction Fuzzy Hash: 70D0EC342206619ADB143B76FE09B1636A99F91755FD50436B914941F1DFEC8880C95C
                                                          APIs
                                                          • DestroyWindow.USER32(?,537E08AE,?,?,?,?,0042FE62,000000FF), ref: 0041DA16
                                                          • DestroyWindow.USER32(?,537E08AE,?,?,?,?,0042FE62,000000FF), ref: 0041DA33
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: DestroyWindow
                                                          • String ID: 0A
                                                          • API String ID: 3375834691-2007828011
                                                          • Opcode ID: 161837be4814b510d9902a9e6e63a5e35f8b1e2428d35ecccc6011dd03927949
                                                          • Instruction ID: 742c35474aecbc2d495c618619e94c506e51131d9200873e0cf2b397f01be0b8
                                                          • Opcode Fuzzy Hash: 161837be4814b510d9902a9e6e63a5e35f8b1e2428d35ecccc6011dd03927949
                                                          • Instruction Fuzzy Hash: BA31ABB1604B018BC720DFB9D884B87BBE8AF48704F04891DE595CB351D779F808CBA5
                                                          APIs
                                                          • SysAllocString.OLEAUT32(?), ref: 00408766
                                                          • __CxxThrowException@8.LIBCMT ref: 00408789
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocException@8StringThrow
                                                          • String ID: out of memory
                                                          • API String ID: 1617264723-2599737071
                                                          • Opcode ID: 1ed9c45135ccbe0afddda232c66c0b4c97afda0b6637c0bc8184c57e8a2482c2
                                                          • Instruction ID: b06795632af80c0f3b2f60a81ac9b2924824ca72a0d9e76516643deceff84f38
                                                          • Opcode Fuzzy Hash: 1ed9c45135ccbe0afddda232c66c0b4c97afda0b6637c0bc8184c57e8a2482c2
                                                          • Instruction Fuzzy Hash: DCF03965210B029AD7589F269E45617B2E4AF98748F24D83FE9DAC3690FF78C944830E
                                                          APIs
                                                          • SetFileTime.KERNELBASE(?,00000000,00000000,?), ref: 0041D02F
                                                          • CloseHandle.KERNELBASE(?), ref: 0041D044
                                                          • GetLastError.KERNEL32 ref: 0041D056
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorFileHandleLastTime
                                                          • String ID:
                                                          • API String ID: 576658152-0
                                                          • Opcode ID: 598afc9bdab16a93d3b10089d4ba35f6cb7ea56aac1ec8cc64db83f033a8fef5
                                                          • Instruction ID: c12e9f6ba34e0cb75690c4241fdf9b3d4b5867d1a81a83578a9db8fa05c906e5
                                                          • Opcode Fuzzy Hash: 598afc9bdab16a93d3b10089d4ba35f6cb7ea56aac1ec8cc64db83f033a8fef5
                                                          • Instruction Fuzzy Hash: EE4160B16407409FE720DB79C884BD3B7E5AB89318F144A1EE19A873A1C779E8C6C758
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,537E08AE,00000000,?,80000000,00000001,00000000), ref: 004083DD
                                                          • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,00000080,00000000,537E08AE,00000000,?,80000000,00000001,00000000), ref: 00408410
                                                          • CreateFileW.KERNEL32(?,?,?,00000000,00000003,00000080,00000000), ref: 0040846E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateFile$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1443461169-0
                                                          • Opcode ID: a958eb1727f0773fe12240db7343fd6a6dfe216b9791fc289c98b5276d088d7d
                                                          • Instruction ID: ea8c27ecf3da15231cfb0a4b39e97664de59f0c511d558578ac63eaab3307ad4
                                                          • Opcode Fuzzy Hash: a958eb1727f0773fe12240db7343fd6a6dfe216b9791fc289c98b5276d088d7d
                                                          • Instruction Fuzzy Hash: 98315CB1608711AFD210DF24DC45B5BBBE8EB89774F104B2EF5A4A32D0DB74A904CB99
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,00000000,537E08AE,?,?,00000000,537E08AE,?,?,?), ref: 00406BF5
                                                          • GetLastError.KERNEL32(?,?), ref: 00406BFF
                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000004,?,?), ref: 00406C45
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$ErrorLast
                                                          • String ID:
                                                          • API String ID: 2485089472-0
                                                          • Opcode ID: 56a95a43980192e959b2e4b50370b07096a6e7883afc364f6167491118b5c463
                                                          • Instruction ID: 59b7f8852602325ad3b7576acbac00231ee3a5ddb581369b778845d7921f0455
                                                          • Opcode Fuzzy Hash: 56a95a43980192e959b2e4b50370b07096a6e7883afc364f6167491118b5c463
                                                          • Instruction Fuzzy Hash: C01105B15083449FD200EF259C81A5BB7A8FB85364F510A3EF595A32D0C738E909CBAA
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(?,?,?,?), ref: 00413C4C
                                                          • GetLastError.KERNEL32 ref: 00413C61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastPointer
                                                          • String ID:
                                                          • API String ID: 2976181284-0
                                                          • Opcode ID: 6b7253807f8ef255e98dfbf493882eb9d2fc15aa48d8ac2fa26197f0956bf59b
                                                          • Instruction ID: e59b8c6c9d207f6d54cab4becb255c60ffc16cf7df699e343ca3dfbb7fc882c3
                                                          • Opcode Fuzzy Hash: 6b7253807f8ef255e98dfbf493882eb9d2fc15aa48d8ac2fa26197f0956bf59b
                                                          • Instruction Fuzzy Hash: 7011B17761120A4B8710CE6CE8409AB7798AB85321F10822BED18D7350E236D95997E5
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,537E08AE,?,?,?,?,?,0042F7E8,000000FF), ref: 00414C6E
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,0042F7E8,000000FF), ref: 00414C9B
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,0042F7E8,000000FF), ref: 00414CD4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$Enter
                                                          • String ID:
                                                          • API String ID: 2978645861-0
                                                          • Opcode ID: 188848c371126ab57bf03bd26e69b33c65c7dd8113ad2cd64a699b042e3b5674
                                                          • Instruction ID: 4acca2b25c34ca54317f79935144ea5dd27772e4ebcf5dfec4b79ca227a1c604
                                                          • Opcode Fuzzy Hash: 188848c371126ab57bf03bd26e69b33c65c7dd8113ad2cd64a699b042e3b5674
                                                          • Instruction Fuzzy Hash: 8A11067A204640AFD304CB48D980F6BB7E9FFC8A20F60452AFA15D3350D775A905CBA5
                                                          APIs
                                                          • GetTempFileNameW.KERNELBASE(00000000,mia,00000000,?,00000000,537E08AE,00407AD3,537E08AE,00000004,537E08AE,00000000,?,?,00000000,?), ref: 004079CE
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8FileNameTempThrow_malloc
                                                          • String ID: mia
                                                          • API String ID: 739282062-834928705
                                                          • Opcode ID: 85ed890860e913ee20a6726b8fb2430cbd5c8761302e1e886de3ef44df40c26c
                                                          • Instruction ID: e059b37136ce9a7132ddeb773af8d25e1d362e9c040abae9839df66ee31215f0
                                                          • Opcode Fuzzy Hash: 85ed890860e913ee20a6726b8fb2430cbd5c8761302e1e886de3ef44df40c26c
                                                          • Instruction Fuzzy Hash: 9FF082B2A046005AE324DB2CD802B57B3F6EF94710F25883BE180E32D4E7B4B8918759
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw_malloc
                                                          • String ID:
                                                          • API String ID: 3476970888-0
                                                          • Opcode ID: 00de60611b3a96967887767fc9f4685b619d8754863df02162bc914e3ce1103d
                                                          • Instruction ID: 2ce8f76c52d71ee6ea90f967cf5ac0dc49b3900ca87f21fdd147f9ed563b7727
                                                          • Opcode Fuzzy Hash: 00de60611b3a96967887767fc9f4685b619d8754863df02162bc914e3ce1103d
                                                          • Instruction Fuzzy Hash: AE61A3716083009BC724DF69D88072BB7E5BB89318F540E2EF995A7381E739E855CB4A
                                                          APIs
                                                          • SetFileAttributesW.KERNELBASE(?,00000000,537E08AE,?,?,00000000,00430508,000000FF,00407419), ref: 00406A40
                                                          • SetFileAttributesW.KERNEL32(537E08AE,00000000), ref: 00406A9B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 187a544e7858a3dfb482a7e8ec67af794a0d5a5258aeab4042801e34d4edc5c8
                                                          • Instruction ID: 6e6e9d07e5e1d0b40351bad84d41fbed830de9d4b3b2563167fee72041689f41
                                                          • Opcode Fuzzy Hash: 187a544e7858a3dfb482a7e8ec67af794a0d5a5258aeab4042801e34d4edc5c8
                                                          • Instruction Fuzzy Hash: 7721B6B26087419FD710EF64AC41B5BB7D4FB85720F440A2EF955933C0D739A909CBA6
                                                          APIs
                                                          • RemoveDirectoryW.KERNELBASE(?,537E08AE,00000000,?,?,00000000,000000FF,00407425,00000000), ref: 00406B32
                                                          • RemoveDirectoryW.KERNELBASE(?,?,?,00000004,?,00000000,000000FF,00407425,00000000), ref: 00406B76
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: DirectoryRemove
                                                          • String ID:
                                                          • API String ID: 597925465-0
                                                          • Opcode ID: ac1f213a70f12f41f1bb15f4098679eba2acecc486c30517d39d7b2e6ffdfcb2
                                                          • Instruction ID: f8b0e0ce4887a377146ac5a6f91a43faa227c917df174c811a8712e04894c35a
                                                          • Opcode Fuzzy Hash: ac1f213a70f12f41f1bb15f4098679eba2acecc486c30517d39d7b2e6ffdfcb2
                                                          • Instruction Fuzzy Hash: B811E7B25043509BC200EF559C41A5BB7A8FB85360F500A3EF591A33C1D73DA909CBAA
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,537E08AE), ref: 0041DFDF
                                                          • PostMessageW.USER32(00000001,00008000,00000000,00000000), ref: 0041DFF5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: MessageObjectPostSingleWait
                                                          • String ID:
                                                          • API String ID: 1869837590-0
                                                          • Opcode ID: 0ae074bdfef50da82f8f66b7cc14cb3ca0f2355ec82bfaede708d9a8856dc369
                                                          • Instruction ID: 67b44cf236718e77661c825e43d0bc0602f7586151c5710897ab21da0a41314e
                                                          • Opcode Fuzzy Hash: 0ae074bdfef50da82f8f66b7cc14cb3ca0f2355ec82bfaede708d9a8856dc369
                                                          • Instruction Fuzzy Hash: 2A11A3B2A08788EFD710CF99D944B9AFBF8EB09764F10426FE91593780C7756904C7A4
                                                          APIs
                                                          • _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2732643326-0
                                                          • Opcode ID: 6bd8fd08a92474bdf1f489356f990fc19856af292f4c7f69916532a116e51352
                                                          • Instruction ID: a8e9cb405463b2bfb29194c4a7db1ddf7ad65b7b3f345e2b191dc1a639ec63bb
                                                          • Opcode Fuzzy Hash: 6bd8fd08a92474bdf1f489356f990fc19856af292f4c7f69916532a116e51352
                                                          • Instruction Fuzzy Hash: 2801BCB06007019AC720DF69D842627F3E4BFD8304F10883EE59AC33A1EB39E465CB46
                                                          APIs
                                                          • WriteFile.KERNELBASE(?,?,?,?,?,?,?,?,00000000), ref: 00413D6E
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00413D98
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastWrite
                                                          • String ID:
                                                          • API String ID: 442123175-0
                                                          • Opcode ID: e3304a8171667333fdaac178f79259fccf236578ad01ac04bc50c7c63b81fbe9
                                                          • Instruction ID: 46ffd835ac929a46f1b1754ee70f3be117443b79a1282e0e598ca55ed5e1d04d
                                                          • Opcode Fuzzy Hash: e3304a8171667333fdaac178f79259fccf236578ad01ac04bc50c7c63b81fbe9
                                                          • Instruction Fuzzy Hash: 690162352043029BD350CF18E944BA777E4AF84705F00892EE559D6250D378DD48CB6A
                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,?,?,?,?,?,?,00000000), ref: 00413BCD
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00413BEF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastRead
                                                          • String ID:
                                                          • API String ID: 1948546556-0
                                                          • Opcode ID: 82dd4830fae7e60dd82e4e8a08d870d85d8bd823a9d0dc89f859ae175ffd171e
                                                          • Instruction ID: 31285fa28142ff3eda2036dbb8780ef0364bf7388d3a88ddde29d243f6d0e8ff
                                                          • Opcode Fuzzy Hash: 82dd4830fae7e60dd82e4e8a08d870d85d8bd823a9d0dc89f859ae175ffd171e
                                                          • Instruction Fuzzy Hash: 22F06D792082029BD304CF18C844B6BB7E4BBC4305F00C92EF595DB391E779E948DB69
                                                          APIs
                                                          • KillTimer.USER32(?,?), ref: 0041BE68
                                                          • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0041BE9C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CallbackDispatcherKillTimerUser
                                                          • String ID:
                                                          • API String ID: 45433635-0
                                                          • Opcode ID: ddf1266d2bd96984e55c2111573cec84cd69dacffde2e565b4b5898f6a62966f
                                                          • Instruction ID: 00470ecef782a90aa5a81525347fb0470b9370af0cd53691b1602fb172eecf1e
                                                          • Opcode Fuzzy Hash: ddf1266d2bd96984e55c2111573cec84cd69dacffde2e565b4b5898f6a62966f
                                                          • Instruction Fuzzy Hash: DDF067722047409BD324DB18E844FABB7E9ABE4714F00491EF98247290C7B9EC85CBA8
                                                          APIs
                                                          • __getptd.LIBCMT ref: 00421FDE
                                                            • Part of subcall function 004244E3: __getptd_noexit.LIBCMT ref: 004244E6
                                                            • Part of subcall function 004244E3: __amsg_exit.LIBCMT ref: 004244F3
                                                            • Part of subcall function 00421F95: __IsNonwritableInCurrentImage.LIBCMT ref: 00421FA8
                                                            • Part of subcall function 00421F95: __getptd_noexit.LIBCMT ref: 00421FB8
                                                            • Part of subcall function 00421F95: __freeptd.LIBCMT ref: 00421FC2
                                                            • Part of subcall function 00421F95: ExitThread.KERNEL32 ref: 00421FCB
                                                          • __XcptFilter.LIBCMT ref: 00421FFF
                                                            • Part of subcall function 0042497E: __getptd_noexit.LIBCMT ref: 00424986
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit$CurrentExitFilterImageNonwritableThreadXcpt__amsg_exit__freeptd__getptd
                                                          • String ID:
                                                          • API String ID: 393088965-0
                                                          • Opcode ID: 8069cb46053e809ece7fc975d9d4d70a304da6873b102c594fd6ad5f9402eec9
                                                          • Instruction ID: 225cb1a2493a05b67e88bf7f72ea339520824f6e15ce0439916c389049fd7118
                                                          • Opcode Fuzzy Hash: 8069cb46053e809ece7fc975d9d4d70a304da6873b102c594fd6ad5f9402eec9
                                                          • Instruction Fuzzy Hash: C9E0BFB56406149FD718BBA1D906E2D7775DF44309F60004EF1015B2B1CA7999409B18
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041C01C
                                                          • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041C032
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ItemMessageSend
                                                          • String ID:
                                                          • API String ID: 3015471070-0
                                                          • Opcode ID: 5de501a1ff413fbe9085e3604fd8fb62ba8ef300bea9de6c68d42dc9b065594f
                                                          • Instruction ID: b39bce7e1dc77a8742afbb46725aac72f2e371372a91e58acbf060f5fe3c6fef
                                                          • Opcode Fuzzy Hash: 5de501a1ff413fbe9085e3604fd8fb62ba8ef300bea9de6c68d42dc9b065594f
                                                          • Instruction Fuzzy Hash: 69D0A77168031067DA604B64FD49F8373D86B0CB01F014A5AF64AD71C0C9F0A4408B08
                                                          APIs
                                                          • _malloc.LIBCMT ref: 00405352
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 0040536E
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2732643326-0
                                                          • Opcode ID: 9c2fadfb130e266a98ccff6bb26c568532dfe8a0070e7586c49056718d7968ee
                                                          • Instruction ID: a602915de48d0db7676f328d3f5172f7efee01bdfe68b84f608bad21c35d458a
                                                          • Opcode Fuzzy Hash: 9c2fadfb130e266a98ccff6bb26c568532dfe8a0070e7586c49056718d7968ee
                                                          • Instruction Fuzzy Hash: 2EC012C091534035DD185731BC0296752E84CA5348F51486FB84591142E97CD65D921F
                                                          APIs
                                                          • ___crtCorExitProcess.LIBCMT ref: 00423D18
                                                            • Part of subcall function 00423CE5: GetModuleHandleW.KERNEL32(mscoree.dll,?,00423D1D,?,?,00421F04,000000FF,0000001E,?,00424AEF,?,00000001,?,?,00422F29,00000018), ref: 00423CEF
                                                            • Part of subcall function 00423CE5: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00423CFF
                                                          • ExitProcess.KERNEL32 ref: 00423D21
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                          • String ID:
                                                          • API String ID: 2427264223-0
                                                          • Opcode ID: 413c8b1009435b3ffbe48e234a8bb614a3e7ee2aa3c7bc32ca9ee7a0a1530568
                                                          • Instruction ID: 7c21544d0a3d036927f1def45caf06a8b18b837482dd20d66ee3204eca29a738
                                                          • Opcode Fuzzy Hash: 413c8b1009435b3ffbe48e234a8bb614a3e7ee2aa3c7bc32ca9ee7a0a1530568
                                                          • Instruction Fuzzy Hash: A6B09232000118BBCF022F13EE0A8493F3AEB803A1B514025F90909031DFB7EE92DA98
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,537E08AE,?,?,?,?,?,0042F7E8,000000FF,0041C7EE,?,?), ref: 0041C3AC
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,0042F7E8,000000FF,0041C7EE,?,?), ref: 0041C427
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3168844106-0
                                                          • Opcode ID: fd4df8d3fcbbb8da80bc25aa3a6ee8a0f33404e5326e133e9b1a93824fd3a48b
                                                          • Instruction ID: 793c60a82a3897cbea006ef7a6d765e9df0119faf799fe96586615b7e53cdcb1
                                                          • Opcode Fuzzy Hash: fd4df8d3fcbbb8da80bc25aa3a6ee8a0f33404e5326e133e9b1a93824fd3a48b
                                                          • Instruction Fuzzy Hash: 4A21F4BA604A00AFC318DF19DA81A6BB3FAFF8C710B50491EF54693B60D774B845CB65
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,537E08AE,?,?,?,?,?,0042F7E8,000000FF,0041C82F,?,?), ref: 0041C47C
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,0042F7E8,000000FF,0041C82F,?,?), ref: 0041C4F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3168844106-0
                                                          • Opcode ID: 804f14f6e22a247da375789de95732f2e138cad818d84c02829c3f8a1e5d6830
                                                          • Instruction ID: 745e08ec57bfe2d81673155d5771ce654260503d44a53da57d59fe68b26565c1
                                                          • Opcode Fuzzy Hash: 804f14f6e22a247da375789de95732f2e138cad818d84c02829c3f8a1e5d6830
                                                          • Instruction Fuzzy Hash: 2321F2BA200A00AFC314DF19DA81A6BB3FAFB8D710F50491DE68293B50D774B805CBA1
                                                          APIs
                                                          • VirtualFree.KERNEL32(?,00000000,00008000,?,00415AD1,537E08AE), ref: 00414AE9
                                                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,00415AD1,537E08AE), ref: 00414B17
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Virtual$AllocFree
                                                          • String ID:
                                                          • API String ID: 2087232378-0
                                                          • Opcode ID: 7819856d66b5851ede3f9bdef5d93ae2c7799b9db804b66b9b6b4ab617a870bd
                                                          • Instruction ID: 3f647bf7e0689e73f0432b280dd933d7141cac813072c7c94ae20007a4340fe1
                                                          • Opcode Fuzzy Hash: 7819856d66b5851ede3f9bdef5d93ae2c7799b9db804b66b9b6b4ab617a870bd
                                                          • Instruction Fuzzy Hash: 8CF0F63168072267DB608E25EC457C777986F447A4F128526F524D73C0C7A4ECD28BD8
                                                          APIs
                                                          • VirtualFree.KERNEL32(?,00000000,00008000,?,00415B38,537E08AE), ref: 00414D78
                                                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,00415B38,537E08AE), ref: 00414DA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Virtual$AllocFree
                                                          • String ID:
                                                          • API String ID: 2087232378-0
                                                          • Opcode ID: 37fe2aa6ff23e776cda0949a660b7ad76bdcf7dc678ab92d592f4fa13fe7be67
                                                          • Instruction ID: 8e2800784cee38b2061e6fe60721290af1e5f1d33f89dcf86bc39648f11f61cb
                                                          • Opcode Fuzzy Hash: 37fe2aa6ff23e776cda0949a660b7ad76bdcf7dc678ab92d592f4fa13fe7be67
                                                          • Instruction Fuzzy Hash: EBF0907164072357EF604F38BD057C637A86B45B61F110026F951DB3C0D7A498D28B98
                                                          APIs
                                                          • FindNextFileW.KERNELBASE(537E08AE,?,?,00000000), ref: 004080ED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FileFindNext
                                                          • String ID:
                                                          • API String ID: 2029273394-0
                                                          • Opcode ID: 4e98acda21bc520af0750d45f365bcf612b41177028bb51abe9b2f04225e281f
                                                          • Instruction ID: 0ac86ba7e6036cb0bca20b54e3df52c499b184387ab912897b1ff671fb7c457c
                                                          • Opcode Fuzzy Hash: 4e98acda21bc520af0750d45f365bcf612b41177028bb51abe9b2f04225e281f
                                                          • Instruction Fuzzy Hash: EE2161706097419FC724DF25D981A6BB7E1BF88304F40892EE5D987381D739F80ACB56
                                                          APIs
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0041BD4F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 3e934bf6b8fda8c9455b302bff1661e1d9bd3881a9536dc17bef4322b8786aa9
                                                          • Instruction ID: 2b345634289db81ae9c8ad967e6cfd939ec9b3350c734fd0bd0422c7a7e865b1
                                                          • Opcode Fuzzy Hash: 3e934bf6b8fda8c9455b302bff1661e1d9bd3881a9536dc17bef4322b8786aa9
                                                          • Instruction Fuzzy Hash: 3C01B1B1700B166BC71CAE64E6C0D9EF395FB44750B50842AE20183B41C779F891CBDC
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 00414EB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw
                                                          • String ID:
                                                          • API String ID: 2005118841-0
                                                          • Opcode ID: ab7e41e99244f33ed92de240ba7b8afb81cc21cbac62c036d2481108839cb380
                                                          • Instruction ID: 7f677e2a0d96dd042953974e68f50ffb109c9cca23682643b4d14ef79ff7504b
                                                          • Opcode Fuzzy Hash: ab7e41e99244f33ed92de240ba7b8afb81cc21cbac62c036d2481108839cb380
                                                          • Instruction Fuzzy Hash: 16F090715007105B8720EB69E8418CBB3E5AE80320B20CD1EF4AE83980E738FC818B6D
                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,?,?,00000000,00000000,?,00000000,0041F8ED,?,00001000,?,80000000,00000001,537E08AE,?), ref: 0040855C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 2621b06c5321a8c3f0fd18990958dce362ec427473b39e7e457abe834a3f0343
                                                          • Instruction ID: f39ee7e7f60ea532393ae8b1daf0349f663640ccd44f9b94e31dfc72485cb8ec
                                                          • Opcode Fuzzy Hash: 2621b06c5321a8c3f0fd18990958dce362ec427473b39e7e457abe834a3f0343
                                                          • Instruction Fuzzy Hash: 15F06D722043066BC754DE49E980B2BB3E8ABE8310F10443EF284D7280EB75A849C779
                                                          APIs
                                                          • GetShortPathNameW.KERNELBASE(?,?,00000105), ref: 0040753C
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8NamePathShortThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2966644318-0
                                                          • Opcode ID: 572c1ff56df4c723897f1b5f8077861ec5bcd5b1864dcfcf38f0de8c29b59959
                                                          • Instruction ID: 803da70797d6faa53c3d6321105406aed6117c351dfe0607d1041baaf81b07e9
                                                          • Opcode Fuzzy Hash: 572c1ff56df4c723897f1b5f8077861ec5bcd5b1864dcfcf38f0de8c29b59959
                                                          • Instruction Fuzzy Hash: 14F0B471A046005BE324DB3CD815997B3F6EF98710B24843FE186E7AD0F7B4A8D28745
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 09be56aac9fe1bcd87d90f05d3fd35e2e31454c41ff1b78bfbc62eebb49b2b9e
                                                          • Instruction ID: b0f22ba89bf6f4baeb6bc1cea3b70d90dd13a4c9dd67412f4e94cd6d2aa3cb97
                                                          • Opcode Fuzzy Hash: 09be56aac9fe1bcd87d90f05d3fd35e2e31454c41ff1b78bfbc62eebb49b2b9e
                                                          • Instruction Fuzzy Hash: 1BF09672104151DAD760D719A840FDBB3E09BA0324F02882FF5558A2A0C23DDDD5CB99
                                                          APIs
                                                          • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,?,00000004,00407A91,00000004,537E08AE,00000000,?,?,00000000,?,?,00000000), ref: 00407969
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8FolderPathThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2862337592-0
                                                          • Opcode ID: 34f6f5cb213bffc77dfebc8498b2f279899a3604e67780ddcea719c6106339d9
                                                          • Instruction ID: 46fce7617049bad6f137b75ed99042ad9b7eccbfa9cfcc549d31155430e20db5
                                                          • Opcode Fuzzy Hash: 34f6f5cb213bffc77dfebc8498b2f279899a3604e67780ddcea719c6106339d9
                                                          • Instruction Fuzzy Hash: 03F0A7716042105BF770AF28DC41B5773E1EF08310F24447BE986DF2D0D6B969C18B59
                                                          APIs
                                                            • Part of subcall function 00407E20: FindClose.KERNEL32(?,537E08AE,?,?), ref: 00407E70
                                                            • Part of subcall function 00407E20: FindFirstFileW.KERNELBASE(?,?,537E08AE,?,?), ref: 00407E8A
                                                            • Part of subcall function 00407E20: FindFirstFileW.KERNELBASE(?,?), ref: 00407EDE
                                                          • FindClose.KERNEL32(FFFFFFFF,?,537E08AE,00000000,?,?,00430488,000000FF,00418955,?), ref: 00407F8E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 2546e1c02685e61960b6156f213b1b43b7edd20205f17317a08b49c00ca059c2
                                                          • Instruction ID: dddce3a9af92c8c3231f840ac9d95d7011c8770734e059ed718bfb036d1edd7c
                                                          • Opcode Fuzzy Hash: 2546e1c02685e61960b6156f213b1b43b7edd20205f17317a08b49c00ca059c2
                                                          • Instruction Fuzzy Hash: 65F06DB5508740AFD304CF18C885B57B7E8E759330F108B2EF869833D0D738A8098A66
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: _malloc
                                                          • String ID:
                                                          • API String ID: 1579825452-0
                                                          • Opcode ID: db1c2a274b80fe3cab9964bc48ea42ac3ec852d3d6926aa7facd0bd6a5778cb0
                                                          • Instruction ID: 7602617d1c0ce983adb61dbcf89cd8959781196aaff58d124a315e77f73bd1bc
                                                          • Opcode Fuzzy Hash: db1c2a274b80fe3cab9964bc48ea42ac3ec852d3d6926aa7facd0bd6a5778cb0
                                                          • Instruction Fuzzy Hash: 92E0EDB060470187DB30CB359891B9377EA7F54344F54892EA89EC7614EB39F884C71A
                                                          APIs
                                                          • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00422E08
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateHeap
                                                          • String ID:
                                                          • API String ID: 10892065-0
                                                          • Opcode ID: 2366ed851773c368dff311633043479c6c90e4a138c4d4a9eb2632cbacb2a32f
                                                          • Instruction ID: 86aee0bac0538ae6b76e20c7bf6ff8a860abe30deba9c378a37622715fe1d8de
                                                          • Opcode Fuzzy Hash: 2366ed851773c368dff311633043479c6c90e4a138c4d4a9eb2632cbacb2a32f
                                                          • Instruction Fuzzy Hash: E7D05E766603046FDB105F717E097233BEC9394395F40443AB90CC6190E5B4C9509608
                                                          APIs
                                                          • _doexit.LIBCMT ref: 00423F38
                                                            • Part of subcall function 00423E00: __lock.LIBCMT ref: 00423E0E
                                                            • Part of subcall function 00423E00: __decode_pointer.LIBCMT ref: 00423E45
                                                            • Part of subcall function 00423E00: __decode_pointer.LIBCMT ref: 00423E5A
                                                            • Part of subcall function 00423E00: __decode_pointer.LIBCMT ref: 00423E84
                                                            • Part of subcall function 00423E00: __decode_pointer.LIBCMT ref: 00423E9A
                                                            • Part of subcall function 00423E00: __decode_pointer.LIBCMT ref: 00423EA7
                                                            • Part of subcall function 00423E00: __initterm.LIBCMT ref: 00423ED6
                                                            • Part of subcall function 00423E00: __initterm.LIBCMT ref: 00423EE6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __decode_pointer$__initterm$__lock_doexit
                                                          • String ID:
                                                          • API String ID: 1597249276-0
                                                          • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                          • Instruction ID: fa2e777966923ff6dfc8112d92b190de78b5184cf570968b1206adc42845c334
                                                          • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                          • Instruction Fuzzy Hash: FAB0927268020833DA202A42BC03F063E1A87C0B68E660021BA0C295A2A9A6AA6580C9
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: _malloc
                                                          • String ID:
                                                          • API String ID: 1579825452-0
                                                          • Opcode ID: 9cafb99de2f3493ce3e7878a8b0fea2fc32f41290bda0b55f0f2156e21cf90c1
                                                          • Instruction ID: d347abebaf0359f5fa1359167306a0a34dd3417ef1332786ed79c0e5b6877914
                                                          • Opcode Fuzzy Hash: 9cafb99de2f3493ce3e7878a8b0fea2fc32f41290bda0b55f0f2156e21cf90c1
                                                          • Instruction Fuzzy Hash: 1FB012BEB0020112D970F921BC41D57B2D83FB0785B85882BB8C8C1120F228E87CC22A
                                                          APIs
                                                          • VirtualFree.KERNELBASE(?,00000000,00008000,537E08AE,?,?,0042EE5B,000000FF), ref: 0041567C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FreeVirtual
                                                          • String ID:
                                                          • API String ID: 1263568516-0
                                                          • Opcode ID: eda4174a4717431e7e9f737c7c7dbf923edcdc2d68691a2a456201ebbdb4da49
                                                          • Instruction ID: 6eac19e29b5bad37f342a6201f77cddbe98d170c480904c3d704713a42110b49
                                                          • Opcode Fuzzy Hash: eda4174a4717431e7e9f737c7c7dbf923edcdc2d68691a2a456201ebbdb4da49
                                                          • Instruction Fuzzy Hash: E6F01975604B41DFD320CF19D884B53B7E8FB88B20F508A19E5A9877D0D779E844CB95
                                                          APIs
                                                          • VirtualFree.KERNELBASE(?,00000000,00008000,537E08AE,?,?,0042EE2B,000000FF), ref: 004156FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FreeVirtual
                                                          • String ID:
                                                          • API String ID: 1263568516-0
                                                          • Opcode ID: c87a56866fa1b47c1608489e454f44b453adb3a14ab80ec470fbf3b0ce0cf926
                                                          • Instruction ID: 7a31c48fe41f0245d7057249d72feef9ac66eab8aee5c8a5e621aac5e61e55c5
                                                          • Opcode Fuzzy Hash: c87a56866fa1b47c1608489e454f44b453adb3a14ab80ec470fbf3b0ce0cf926
                                                          • Instruction Fuzzy Hash: 6CF01475604B81DFD720CF18D881B53B7E8FB88B20F204A29E9A5873D0D779E844CB95
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast
                                                          • String ID:
                                                          • API String ID: 1452528299-0
                                                          • Opcode ID: d2ddbbd5ed56630edbf359f3a6a23b87cf336805f66c5b382b2410dfdd830d39
                                                          • Instruction ID: 96464189ef5ab4881843a27eb04bb39dfb4e36e9bcfaf951d4a3f0df901096ff
                                                          • Opcode Fuzzy Hash: d2ddbbd5ed56630edbf359f3a6a23b87cf336805f66c5b382b2410dfdd830d39
                                                          • Instruction Fuzzy Hash: FFE0C2B13042016BF3249B749C45FA7339CAB90705F20403EB606D91C0EAA4E890C22D
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: _malloc$Exception@8Throw$CriticalDeleteSection
                                                          • String ID: 8@C
                                                          • API String ID: 4184010672-3398775317
                                                          • Opcode ID: 4c5b3bca666bce3093585746d5be962a3c73d676d1dd6046193adceac47d38f2
                                                          • Instruction ID: da0a2bb2dffd0da2cf288ff33df2b5a874d38cbaed28d2defd6f584eaea280d2
                                                          • Opcode Fuzzy Hash: 4c5b3bca666bce3093585746d5be962a3c73d676d1dd6046193adceac47d38f2
                                                          • Instruction Fuzzy Hash: 41C26C716083818FC324DF69C480B9BBBE4BFC9304F14892EF58997391DB79A945CB96
                                                          APIs
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 00405390: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,?,00000004), ref: 00405410
                                                            • Part of subcall function 00405390: __CxxThrowException@8.LIBCMT ref: 0040542C
                                                          • _malloc.LIBCMT ref: 00405787
                                                          • _malloc.LIBCMT ref: 00405854
                                                          • _malloc.LIBCMT ref: 004058F3
                                                          • _malloc.LIBCMT ref: 00405992
                                                          • _malloc.LIBCMT ref: 00405A31
                                                          • _malloc.LIBCMT ref: 00405AD0
                                                          • _malloc.LIBCMT ref: 00405B6D
                                                          • _malloc.LIBCMT ref: 00405C12
                                                          • __CxxThrowException@8.LIBCMT ref: 00405DDD
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          • __CxxThrowException@8.LIBCMT ref: 00405E7A
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          • __CxxThrowException@8.LIBCMT ref: 00405E95
                                                          • __CxxThrowException@8.LIBCMT ref: 00405EB0
                                                          • __CxxThrowException@8.LIBCMT ref: 00405ECB
                                                          • __CxxThrowException@8.LIBCMT ref: 00405EE6
                                                          • __CxxThrowException@8.LIBCMT ref: 00405F01
                                                          • __CxxThrowException@8.LIBCMT ref: 00405F1C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$_malloc$ByteCharErrorExceptionFreeHeapLastMultiRaiseWide___sbh_find_block___sbh_free_block__lock
                                                          • String ID:
                                                          • API String ID: 1646499912-0
                                                          • Opcode ID: 6575ba569594f88a5ed10eb1e61e9a88485f65cbca5aba06d6520043add3f438
                                                          • Instruction ID: d3f9713f669ec5f3df7da001e5281389b91580916c26e67ca497a4527f5a7d99
                                                          • Opcode Fuzzy Hash: 6575ba569594f88a5ed10eb1e61e9a88485f65cbca5aba06d6520043add3f438
                                                          • Instruction Fuzzy Hash: C3421571608B908BD7209F39888076BBBE5EF95304F544A2EE8D5D7392D67CE805CF86
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 00412DF1
                                                          • __CxxThrowException@8.LIBCMT ref: 00412E08
                                                            • Part of subcall function 004130B0: _malloc.LIBCMT ref: 004130D8
                                                            • Part of subcall function 004130B0: __CxxThrowException@8.LIBCMT ref: 004130F6
                                                          • __CxxThrowException@8.LIBCMT ref: 00412E86
                                                          • __CxxThrowException@8.LIBCMT ref: 00412EEF
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          • SetEvent.KERNEL32(?,00000000,?,?,?,?,?,?,?,00437FD4), ref: 00412F8B
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,00437FD4), ref: 00412F91
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,00437FD4), ref: 00412FD4
                                                            • Part of subcall function 004154B0: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412F53,?,?,?,?,?,?,?,00437FD4), ref: 004154C5
                                                            • Part of subcall function 004154B0: GetLastError.KERNEL32(?,?,?,?,?,?,?,00437FD4), ref: 004154CE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ErrorEventLast$CreateExceptionObjectRaiseSingleWait_malloc
                                                          • String ID:
                                                          • API String ID: 2637030848-0
                                                          • Opcode ID: f9fdbc78714b5f468024bd4ccc9f89bcb4f92527db628ae5e64e64e821519191
                                                          • Instruction ID: 6db37e9d7ad01f81545c4ce0e11e49c4d9759a330240abb6dd05be9c37f6078c
                                                          • Opcode Fuzzy Hash: f9fdbc78714b5f468024bd4ccc9f89bcb4f92527db628ae5e64e64e821519191
                                                          • Instruction Fuzzy Hash: C5027D746047029FC724CF28C580AABB3E1FB88304F248A5EE599C7355D775F896CB95
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 00422D1D
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00422D32
                                                          • UnhandledExceptionFilter.KERNEL32(00432388), ref: 00422D3D
                                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 00422D59
                                                          • TerminateProcess.KERNEL32(00000000), ref: 00422D60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                          • String ID:
                                                          • API String ID: 2579439406-0
                                                          • Opcode ID: ee80e8d3c8b4e1287dcdca918fd6cd3014df0d1a4d5be41a5f58ca83e8ce57d4
                                                          • Instruction ID: 6df77d042e21db70d105d2c9e33ae376466ac4bc9509ba677e5ade4139247391
                                                          • Opcode Fuzzy Hash: ee80e8d3c8b4e1287dcdca918fd6cd3014df0d1a4d5be41a5f58ca83e8ce57d4
                                                          • Instruction Fuzzy Hash: 5E21F274906201EFD700DF5AFE896447BB4BB2C324F50A53AE509973E1E3B458858F0D
                                                          APIs
                                                          • _malloc.LIBCMT ref: 0040E941
                                                          • __CxxThrowException@8.LIBCMT ref: 0040EA84
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExceptionException@8RaiseThrow_malloc
                                                          • String ID:
                                                          • API String ID: 1621474382-3916222277
                                                          • Opcode ID: 4127ce21aac610060991a7e4c62f26f7d9d08e8a3ecb5e928be9a0cc2228c74f
                                                          • Instruction ID: 6bf4d4a0c66dc1ea962e3fac851877465544c5f1d051c7262505d9f3521c3fa1
                                                          • Opcode Fuzzy Hash: 4127ce21aac610060991a7e4c62f26f7d9d08e8a3ecb5e928be9a0cc2228c74f
                                                          • Instruction Fuzzy Hash: BEE17E756043018FC714DF2AC580A1BB7E5BF89314F548D3FE9A6A7391C638E865CB8A
                                                          APIs
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                          • FormatMessageW.KERNEL32(00001300,00000000,?,00000000,?,00000000,00000000,00000004,537E08AE,74DEE010,?,?), ref: 0041B170
                                                          • LocalFree.KERNEL32(?), ref: 0041B18A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8FormatFreeLocalMessageThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2713084418-0
                                                          • Opcode ID: ac5f01f677d42775a070dfc2d7d76652363426f171e82a111de39c834594508d
                                                          • Instruction ID: f5968aaa4db2781cbfa919783bd6b72111f4b5590e0f3694e6d324342bca7b18
                                                          • Opcode Fuzzy Hash: ac5f01f677d42775a070dfc2d7d76652363426f171e82a111de39c834594508d
                                                          • Instruction Fuzzy Hash: 1A1106B1204740AFD214DF1AD945F5BFBF8EBD8B54F104A2EF19593250C3B4A904CB65
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 622117b63befa7973a322741aeb603a8934fb9cc7300e44e43da5c37f40fa5d3
                                                          • Instruction ID: 3e93a4eee694f26e6faae586ba0078f3ad04e973345864326b6e953aeb32d7b0
                                                          • Opcode Fuzzy Hash: 622117b63befa7973a322741aeb603a8934fb9cc7300e44e43da5c37f40fa5d3
                                                          • Instruction Fuzzy Hash: DC51F631B106204AF348CF769C851AA3BD3D7C9386B44C63DE659D66E8DABDC017C798
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c9805ec844e61b1c20006ad2471b23da2c5c5d9f86331cec8f43e7bb082fc1db
                                                          • Instruction ID: a617d443dbee23744503749e53e855a887ddea7c71caec0ae79ad38ee72a4a7a
                                                          • Opcode Fuzzy Hash: c9805ec844e61b1c20006ad2471b23da2c5c5d9f86331cec8f43e7bb082fc1db
                                                          • Instruction Fuzzy Hash: D451F731B106204AF348CF368C852AA7BD3D7CA346F44C63DE659D66E8DABDC017C698
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00026BE8), ref: 00426C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: e861745a69044617ac1bea6ecfa3d2f0e8736b247a0f242b783b82f71a65e87b
                                                          • Instruction ID: 962ed4ba0d295f6b9a0c84e56d2007df0ba939f6c58a15a6d83148043966d6dd
                                                          • Opcode Fuzzy Hash: e861745a69044617ac1bea6ecfa3d2f0e8736b247a0f242b783b82f71a65e87b
                                                          • Instruction Fuzzy Hash: 7A9002B0355524464E4017757E0950539A05A88B127D714616101C8054DBD490409519
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 18309e6ef098ee44329f294808c0462ed8b4c6f897a052627e43a1a5366fdf93
                                                          • Instruction ID: e4f4b5f0e6080d98b9ee51d6b85e52c5fa7c1b81b31bb3f3eb6839b9fe8b0d70
                                                          • Opcode Fuzzy Hash: 18309e6ef098ee44329f294808c0462ed8b4c6f897a052627e43a1a5366fdf93
                                                          • Instruction Fuzzy Hash: E19238B1908381CFC724DF15C480A9BBBE5BF89304F14892EE59A97352D778A885CF96
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw
                                                          • String ID:
                                                          • API String ID: 2005118841-0
                                                          • Opcode ID: f0f49e76071627281c60fd3ab089d3b336aad91d20a840542ed0eb56c7fb7762
                                                          • Instruction ID: 3095d77bb6f78aa45d5fb910dec581cee314f00d86e746a1153facfe542a7aca
                                                          • Opcode Fuzzy Hash: f0f49e76071627281c60fd3ab089d3b336aad91d20a840542ed0eb56c7fb7762
                                                          • Instruction Fuzzy Hash: 042238755043419FC734DF15C480A6BB7E1FB88314F14893EE899AB792DB38E84ACB86
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9803c8db8919b39b22e60e951130245479d9368fb12c4fe1c3f5fb4592283aad
                                                          • Instruction ID: c2d97246fd2aafeb022947b6bb86a1446f9da4e42c3c7867536164bb694cac53
                                                          • Opcode Fuzzy Hash: 9803c8db8919b39b22e60e951130245479d9368fb12c4fe1c3f5fb4592283aad
                                                          • Instruction Fuzzy Hash: 80024C72A042114BD708CE18C580279BFE6FBC5346F114A3FE496A77C4D778DA88CB99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 205793e7145c16a5e0c2912e64e9f233fbc1bf0e4f6c3dde8f69b1dc978c8365
                                                          • Instruction ID: d1afe5bdaaf273eaa513a6fab511294eb2313c4e303bc650a9aebec8748cfb60
                                                          • Opcode Fuzzy Hash: 205793e7145c16a5e0c2912e64e9f233fbc1bf0e4f6c3dde8f69b1dc978c8365
                                                          • Instruction Fuzzy Hash: 61E136719083858FD764DF59C480B5BBBE0FF89304F10492EE99A97391D774A809CF86
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 64d347874e94e17a2217a0dc20e9d9653d82e18ffac58338c6f5489616670a27
                                                          • Instruction ID: 3ceeb9f01f185fd99b8167d9a09416257b1ad7465954055751da435def19fb93
                                                          • Opcode Fuzzy Hash: 64d347874e94e17a2217a0dc20e9d9653d82e18ffac58338c6f5489616670a27
                                                          • Instruction Fuzzy Hash: 65D1D032C156A64FE314EF5DEC812357762ABC8300F6E1279CB58173A2CA34F612DB98
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8b7d9839d863fb000ff702bf221cb0633bd704a472fd011186c38929c58f0f53
                                                          • Instruction ID: 78e49fb2be52b2f7f58f30e4f95c54c21e56b5d13c11c68cfb1cca23aa70ab33
                                                          • Opcode Fuzzy Hash: 8b7d9839d863fb000ff702bf221cb0633bd704a472fd011186c38929c58f0f53
                                                          • Instruction Fuzzy Hash: 3FD1D3378142664FD394DF59DC852397762EBC9300F1E067DCB5917292C634FA22DB98
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ed524da47b8aa2ae254806281c4a749b71c931bd55644e6fcbbed78bd4e0280e
                                                          • Instruction ID: 57494768f0b92b70c1e5fb60671f8c0904b92fa69cceb7a89f96e62002fbccdf
                                                          • Opcode Fuzzy Hash: ed524da47b8aa2ae254806281c4a749b71c931bd55644e6fcbbed78bd4e0280e
                                                          • Instruction Fuzzy Hash: 7E61F4112197D29FD311CE3D488026CFFE1EFA71047588B6ED8D287B86C668E56AC7E1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c57aee5bc17977aafdc7c97f7c58be596e940ff6eefc37f40ebb5461949aa7fb
                                                          • Instruction ID: 69ac4843b161a5063ae5296b824130d1e1d4dd1cf33e14d0e2b6e5324ebe5178
                                                          • Opcode Fuzzy Hash: c57aee5bc17977aafdc7c97f7c58be596e940ff6eefc37f40ebb5461949aa7fb
                                                          • Instruction Fuzzy Hash: 78614A725087118FC318DF49D48494AF3E1FFC8328F1A8A6DEA885B361D771E959CB86
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7edf9d7677cf5a148deedc6415e29e53bd66bb8e929762ed0f0be55657242144
                                                          • Instruction ID: 22718e2ba8aa9c85a7860933c045bfb99706646b777ed0143ccf77e3315a414a
                                                          • Opcode Fuzzy Hash: 7edf9d7677cf5a148deedc6415e29e53bd66bb8e929762ed0f0be55657242144
                                                          • Instruction Fuzzy Hash: 71315871E046B607E320DE1E8C40126BBD3AFD2311F18C27ED5AC8B79EE479955296A4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b6af16c8484d87dd613c3a1aa62de61aa8fd9c2e42459e8d3272b73d93abbe76
                                                          • Instruction ID: db6508d24fc9758a38762259af66184612b3ffe3fafafd84facb5b971e2ac8eb
                                                          • Opcode Fuzzy Hash: b6af16c8484d87dd613c3a1aa62de61aa8fd9c2e42459e8d3272b73d93abbe76
                                                          • Instruction Fuzzy Hash: D8110A3E370D0607E71C8769AD33BB921C2E385309B88A53DF68BC96D1EEAD9494C50D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9de65a982604af57022305bde5ac8764cd96b40e1cb3bce903844e2d22169a83
                                                          • Instruction ID: 745e0ab5a1f4135cb869288e75bb92ef0094498d29e0feb23aae1f7a6adb8ed7
                                                          • Opcode Fuzzy Hash: 9de65a982604af57022305bde5ac8764cd96b40e1cb3bce903844e2d22169a83
                                                          • Instruction Fuzzy Hash: 0111CE37A54A270BD324A96CDC80B777392EB8A354F1A4271DF449F392D538A94282E8
                                                          APIs
                                                          • VirtualAlloc.KERNEL32(00000000,00020000,00001000,00000004,537E08AE,?,00000000,?,00000000,0042EEE7,000000FF,00413965), ref: 00414209
                                                          • __CxxThrowException@8.LIBCMT ref: 00414228
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocExceptionException@8RaiseThrowVirtual
                                                          • String ID: JA$0?A$C&B$C&B$C&B$C&B$C&B$C&B$C&B$PJA
                                                          • API String ID: 3950171414-2120522429
                                                          • Opcode ID: 0d5661974bf269f5af8409563256e4c29114449b89244a4f43cb1bf1215309df
                                                          • Instruction ID: 260438ba03119f7b615b79ac7b2777a53ea5ea2c99cdc2cdac365c488f08df6f
                                                          • Opcode Fuzzy Hash: 0d5661974bf269f5af8409563256e4c29114449b89244a4f43cb1bf1215309df
                                                          • Instruction Fuzzy Hash: E721C4B0504B808FC320CF869544A87FBF4FB98758F109E4FE5A697A50C3B8B148CB99
                                                          APIs
                                                          • SetEvent.KERNEL32(?,537E08AE,?,?,00000000,00000000,0042FB21,000000FF,0040AD9B,?,?), ref: 00415582
                                                          • GetLastError.KERNEL32 ref: 0041558C
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,537E08AE,?,?,00000000,00000000,0042FB21,000000FF,0040AD9B,?,?), ref: 0041559C
                                                          • CloseHandle.KERNEL32(?,537E08AE,?,?,00000000,00000000,0042FB21,000000FF,0040AD9B,?,?), ref: 004155B4
                                                          • GetLastError.KERNEL32 ref: 004155C0
                                                          • CloseHandle.KERNEL32(?,537E08AE,?,?,00000000,00000000,0042FB21,000000FF,0040AD9B,?,?), ref: 004155DE
                                                          • GetLastError.KERNEL32 ref: 004155E4
                                                          • CloseHandle.KERNEL32(?,537E08AE,?,?,00000000,00000000,0042FB21,000000FF,0040AD9B,?,?), ref: 004155FF
                                                          • GetLastError.KERNEL32 ref: 00415605
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$CloseHandle$EventObjectSingleWait
                                                          • String ID: C&B
                                                          • API String ID: 2212007442-3599845651
                                                          • Opcode ID: c57171be3ed920f45849e8ec44a75f0ffdecc9bc2c30afcfb972f860a568f160
                                                          • Instruction ID: 665055ef18fc4c7992229bbc331917046034d4750283f4bd9219c4516c9acca3
                                                          • Opcode Fuzzy Hash: c57171be3ed920f45849e8ec44a75f0ffdecc9bc2c30afcfb972f860a568f160
                                                          • Instruction Fuzzy Hash: 34219EB1204B42DBD720DF25DC84B97BBE9EB94760F10492EE965C3390D739E848CB69
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00406531
                                                          • SetForegroundWindow.USER32(00000000), ref: 00406538
                                                          • ShowWindow.USER32(?,00000005), ref: 004065B4
                                                          • PeekMessageW.USER32(00000000,?,00000000,00000000,00000000), ref: 004065CC
                                                          • DialogBoxParamW.USER32(00400000,?,?,Function_000063F0,?), ref: 004065E9
                                                          • SetEvent.KERNEL32(?), ref: 004065F6
                                                          • ShowWindow.USER32(?,00000005), ref: 00406607
                                                          • PeekMessageW.USER32(00000000,?,00000000,00000000,00000000), ref: 0040661C
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00406632
                                                          • SetEvent.KERNEL32(?), ref: 0040663F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Window$Message$EventPeekShow$DesktopDialogForegroundParam
                                                          • String ID:
                                                          • API String ID: 1049595212-0
                                                          • Opcode ID: 3d40821ce19ca547cea518ffdd8c62fdf5f8a9e0590e93619e838d0074d6cd98
                                                          • Instruction ID: c328493347b47e5292b43415d999d64e624e09d027fc7698bf52afcf243555f5
                                                          • Opcode Fuzzy Hash: 3d40821ce19ca547cea518ffdd8c62fdf5f8a9e0590e93619e838d0074d6cd98
                                                          • Instruction Fuzzy Hash: D6518176300201AFD624CF58ED88F6BB7A9EBD8711F11852EF64687390C671EC55CBA8
                                                          APIs
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 0041D370: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,537E08AE,?,?,?,00000000,?,?,0042FEA9,000000FF,0041D90D,?,00000004), ref: 0041D3B2
                                                            • Part of subcall function 0041D370: RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE,?,?,00000000,00000000), ref: 0041D3C2
                                                            • Part of subcall function 0041D370: RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE,?,?,00000000,00000000), ref: 0041D3CC
                                                            • Part of subcall function 0041D370: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000004,?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE), ref: 0041D44F
                                                            • Part of subcall function 0041D370: GetLastError.KERNEL32(?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE,?,?,00000000,00000000,00430209), ref: 0041D458
                                                            • Part of subcall function 0041D370: __CxxThrowException@8.LIBCMT ref: 0041D470
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000004,00000004,00000004,00000004,537E08AE,?,?,00000000,00000000,00430209,000000FF), ref: 0041D92D
                                                          • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG), ref: 0041D944
                                                          • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX), ref: 0041D951
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: MessageRegisterWindow$CreateEvent$Exception@8Throw$ErrorLast_malloc
                                                          • String ID: 0A$C&B$C&B$CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG
                                                          • API String ID: 1053270758-1754678918
                                                          • Opcode ID: 6b9a2186c4aacdd9aa879c590d57c6f905f6d015003411dcbe7587b3d416dfd2
                                                          • Instruction ID: ff79ae979ea3c55558c752116325ba362ad5e0a4aeac68ff67176371f723eebb
                                                          • Opcode Fuzzy Hash: 6b9a2186c4aacdd9aa879c590d57c6f905f6d015003411dcbe7587b3d416dfd2
                                                          • Instruction Fuzzy Hash: 5A4116B1904B82AEC314CF26C881782FBE4BB58704F508A2EE6A957651C378B558CBD5
                                                          APIs
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,537E08AE,?,?,?,00000000,?,?,0042FEA9,000000FF,0041D90D,?,00000004), ref: 0041D3B2
                                                          • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE,?,?,00000000,00000000), ref: 0041D3C2
                                                          • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE,?,?,00000000,00000000), ref: 0041D3CC
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 004047C0: InitializeCriticalSection.KERNEL32(?,537E08AE), ref: 004047FE
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000004,?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE), ref: 0041D44F
                                                          • GetLastError.KERNEL32(?,?,0042FEA9,000000FF,0041D90D,?,00000004,00000004,00000004,00000004,537E08AE,?,?,00000000,00000000,00430209), ref: 0041D458
                                                          • __CxxThrowException@8.LIBCMT ref: 0041D470
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          • CDialog::MSG_CREATE_MESSAGE_BOX, xrefs: 0041D3C4
                                                          • CDialog::MSG_CREATE_MODAL_DLG, xrefs: 0041D3BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateEventException@8MessageRegisterThrowWindow$CriticalErrorExceptionInitializeLastRaiseSection_malloc
                                                          • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG
                                                          • API String ID: 2475960406-1515309323
                                                          • Opcode ID: dd1457a73b0a163e9de1fc32d0a7b1367226a52f8b3e557f26fbd9f6b0ed3806
                                                          • Instruction ID: ce6adb0846dacee929c4b269caab47ed56b5dce5ab6c1ff985edc843b1e8f192
                                                          • Opcode Fuzzy Hash: dd1457a73b0a163e9de1fc32d0a7b1367226a52f8b3e557f26fbd9f6b0ed3806
                                                          • Instruction Fuzzy Hash: E6316FB1604B86AFD304CF29C881B86FFE8FB59354F50462FE19893651C778B458CB99
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,537E08AE,?,?,?,?,?,?,0042F9F0,000000FF), ref: 0041D4C5
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041D4FC
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D50E
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041D518
                                                          • PostMessageW.USER32(?,?,?,?), ref: 0041D533
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D53F
                                                          • CloseHandle.KERNEL32(?), ref: 0041D545
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0041D55E
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041D587
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeaveObjectSingleWait$CloseCreateEventHandleMessagePost
                                                          • String ID:
                                                          • API String ID: 3292403733-0
                                                          • Opcode ID: 2ab1832f6a7bee7da5fac1aacacfabd99e4207771d9bb24a02fab69fbfaa0d40
                                                          • Instruction ID: f3d772afd4ee5944f76de5045bb3e40646552dd8c4de7b14b0dca013c747943b
                                                          • Opcode Fuzzy Hash: 2ab1832f6a7bee7da5fac1aacacfabd99e4207771d9bb24a02fab69fbfaa0d40
                                                          • Instruction Fuzzy Hash: 793134B1204740AFD324CB29CD84B27B7F9FB89724F104A1DF699933A0C7B4A805CB69
                                                          APIs
                                                          • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000,00000000,00420E70), ref: 0041E8F3
                                                          • lstrlenW.KERNEL32(00000000), ref: 0041E900
                                                          • LocalAlloc.KERNEL32(00000000,00000040), ref: 0041E937
                                                          • swprintf.LIBCMT ref: 0041E96E
                                                          • swprintf.LIBCMT ref: 0041E983
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: swprintf$AllocFormatLocalMessagelstrlen
                                                          • String ID: IDispatch error #%d$Unknown error 0x%0lX
                                                          • API String ID: 1134423501-2934499512
                                                          • Opcode ID: f6e50c7be8be514e84a0b90db71478859d0b6e887827da412b84fe5d130f3157
                                                          • Instruction ID: dfc2c100d0fa81078b2a730f8d319b60173ab00cae5a86e14b41508050d6b34f
                                                          • Opcode Fuzzy Hash: f6e50c7be8be514e84a0b90db71478859d0b6e887827da412b84fe5d130f3157
                                                          • Instruction Fuzzy Hash: 9C21EBB0600210A7E774DB29ED45FE673A5EF50344F208059F584DB2D1D3B9BC46CB98
                                                          APIs
                                                          • _memset.LIBCMT ref: 0041F654
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00002000,?,?,?), ref: 0041F668
                                                          • RegCreateKeyExW.ADVAPI32 ref: 0041F694
                                                          • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000004,00000000,00000004), ref: 0041F6B6
                                                          • RegCloseKey.ADVAPI32(00000000,?,00000000,00000000,00000004,00000000,00000004), ref: 0041F6C0
                                                          Strings
                                                          • , xrefs: 0041F6AE
                                                          • Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted, xrefs: 0041F682
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateFileModuleNameValue_memset
                                                          • String ID: $Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
                                                          • API String ID: 2280741871-2837994659
                                                          • Opcode ID: 02b76c714ddad47070057f04439b6013b1663233fbc740c1de6452bbb3833300
                                                          • Instruction ID: 37a7b5702278f112b31955c87cec25a7fde7f3e4c6faff8a8326e10aa8a02003
                                                          • Opcode Fuzzy Hash: 02b76c714ddad47070057f04439b6013b1663233fbc740c1de6452bbb3833300
                                                          • Instruction Fuzzy Hash: 1D014071254300BFF214DB50DC8AFAA77A4AB98B04F50841DB7489A1D2DBB46408CB5A
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0041B562
                                                          • SetWindowTextW.USER32(00000000,?), ref: 0041B570
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                          • SetWindowTextW.USER32(?,?), ref: 0041B5C7
                                                          • SetDlgItemTextW.USER32(?,000003E8,?), ref: 0041B623
                                                          • SetDlgItemTextW.USER32(?,00000001,?), ref: 0041B67C
                                                          • SetDlgItemTextW.USER32(?,00000002,?), ref: 0041B6D5
                                                          • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041B6E7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Text$Item$Window$ErrorException@8FreeHeapLastMessageSendThrow___sbh_find_block___sbh_free_block__lock_malloc
                                                          • String ID:
                                                          • API String ID: 1891682577-0
                                                          • Opcode ID: a8893c355988dc046967399e1d6393c2a355a0867427ab7a748b946283110e5f
                                                          • Instruction ID: b462c79913f27606fce5be96d1d4db49be7a94859ae037c386c9d335dcadd2b5
                                                          • Opcode Fuzzy Hash: a8893c355988dc046967399e1d6393c2a355a0867427ab7a748b946283110e5f
                                                          • Instruction Fuzzy Hash: E55164B1508380AFD700EF69DC85B4BBBE4AF98354F50091DF68597292C7B8E544CB67
                                                          APIs
                                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412F53,?,?,?,?,?,?,?,00437FD4), ref: 004154C5
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,00437FD4), ref: 004154CE
                                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412F53,?,?,?,?,?,?,?,00437FD4), ref: 004154ED
                                                          • ResetEvent.KERNEL32(00000000,?,?,00412F53,?,?,?,?,?,?,?,00437FD4), ref: 00415501
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,00437FD4), ref: 0041550D
                                                          • ResetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,00437FD4), ref: 00415513
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,00437FD4), ref: 00415519
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Event$ErrorLast$CreateReset
                                                          • String ID:
                                                          • API String ID: 2684445861-0
                                                          • Opcode ID: 397fea74b750bfb1b0a927181ac41e1428b8659026dfcbaf32b253da1c8ae01f
                                                          • Instruction ID: 46a4382e4f685cd8f0a90a1e671664aa1b9fbbb21dc1a77a4e7868b3bece67f6
                                                          • Opcode Fuzzy Hash: 397fea74b750bfb1b0a927181ac41e1428b8659026dfcbaf32b253da1c8ae01f
                                                          • Instruction Fuzzy Hash: 00118831300B01EAE7709B79EC80B97B3E95FD0715F10842AE215D6694D7B8F8C58628
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,537E08AE), ref: 0041BEED
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041BEF7
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0041BF05
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041BF36
                                                          • MessageBoxW.USER32(?,?,?,00000024), ref: 0041BF65
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Message
                                                          • String ID:
                                                          • API String ID: 850481049-0
                                                          • Opcode ID: 0fc563b75534699d1d46bfe3fa0fa692735b2cfc7cf69dda51ce6e4883b0f232
                                                          • Instruction ID: d58ba03eace6790549a51d7cf0a140a1ee8029c9543b5873e91039f9fafb8494
                                                          • Opcode Fuzzy Hash: 0fc563b75534699d1d46bfe3fa0fa692735b2cfc7cf69dda51ce6e4883b0f232
                                                          • Instruction Fuzzy Hash: B94189B5204345AFC324DF28C984BABBBE4FB89314F100619F55583791C738E94ACF9A
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0041BD89
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041BD92
                                                          • PostMessageW.USER32(?,00008000,00000000,00000000), ref: 0041BDB2
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0041BDBF
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041BDE2
                                                          • __aulldiv.LIBCMT ref: 0041BE2C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$MessagePost__aulldiv
                                                          • String ID:
                                                          • API String ID: 3743465594-0
                                                          • Opcode ID: 8ddcddcfe8e5cc343d9f3872b492c1c617b7ef677ad0fa64153c49aec06e9001
                                                          • Instruction ID: 0f6cecad49a1d158afd731c11dc079c735cde051cd0f7b3838b3757deac6ee7a
                                                          • Opcode Fuzzy Hash: 8ddcddcfe8e5cc343d9f3872b492c1c617b7ef677ad0fa64153c49aec06e9001
                                                          • Instruction Fuzzy Hash: 4621BD72604704ABC324EF759D81FABF7E9EB85B00F04081EFA9647341CB75B84987A9
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041C209
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041C22B
                                                          • SendMessageW.USER32(00000000,?,00000000,?), ref: 0041C243
                                                          • CloseHandle.KERNEL32(?), ref: 0041C24D
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041C259
                                                          • MessageBoxW.USER32(00000000,?,?,?), ref: 0041C27C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: MessageObjectSingleWait$CloseCreateEventHandleSend
                                                          • String ID:
                                                          • API String ID: 3833482109-0
                                                          • Opcode ID: 6d17b11e7bcf11a9d7b57836135ff4d9eb2c6b9d4dfdb948564495aa17a6fda9
                                                          • Instruction ID: a341cd1b27fd06dd4103b1dfc400c87a0f2c7d7423bf8431d21d9bbe00f176ce
                                                          • Opcode Fuzzy Hash: 6d17b11e7bcf11a9d7b57836135ff4d9eb2c6b9d4dfdb948564495aa17a6fda9
                                                          • Instruction Fuzzy Hash: 7A110775604301AFD224DF58DD85F5BF7F4EB98B10F108A1EF59593290D6B0E809CBA6
                                                          APIs
                                                          • __CreateFrameInfo.LIBCMT ref: 0042DE50
                                                            • Part of subcall function 0042D8E0: __getptd.LIBCMT ref: 0042D8EE
                                                            • Part of subcall function 0042D8E0: __getptd.LIBCMT ref: 0042D8FC
                                                          • __getptd.LIBCMT ref: 0042DE5A
                                                            • Part of subcall function 004244E3: __getptd_noexit.LIBCMT ref: 004244E6
                                                            • Part of subcall function 004244E3: __amsg_exit.LIBCMT ref: 004244F3
                                                          • __getptd.LIBCMT ref: 0042DE68
                                                          • __getptd.LIBCMT ref: 0042DE76
                                                          • __getptd.LIBCMT ref: 0042DE81
                                                          • _CallCatchBlock2.LIBCMT ref: 0042DEA7
                                                            • Part of subcall function 0042D985: __CallSettingFrame@12.LIBCMT ref: 0042D9D1
                                                            • Part of subcall function 0042DF4E: __getptd.LIBCMT ref: 0042DF5D
                                                            • Part of subcall function 0042DF4E: __getptd.LIBCMT ref: 0042DF6B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1602911419-0
                                                          • Opcode ID: 732a5a4de1712c62318a0ddeb78ca340981344dd2e45324716b5b23d54ed3c5d
                                                          • Instruction ID: 2feef8606836cd958bd5a2fd3112628b4059505882e4cd18e6819dd8d5e60df7
                                                          • Opcode Fuzzy Hash: 732a5a4de1712c62318a0ddeb78ca340981344dd2e45324716b5b23d54ed3c5d
                                                          • Instruction Fuzzy Hash: 6D1107B1E00219DFDB00EFA5E946BAD7BB0FF08318F50806AF814A7251DB789A11DF58
                                                          APIs
                                                          • _malloc.LIBCMT ref: 0041A470
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 0041A48C
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          • GetLastError.KERNEL32(00434200,80000000,00000001), ref: 0041A4D6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateErrorExceptionException@8HeapLastRaiseThrow_malloc
                                                          • String ID: C&B$`:A
                                                          • API String ID: 1656954132-1488716206
                                                          • Opcode ID: 2a486e199a1073192d2ab76fdaf9423da61f3946df1b212c46d744dd35da5e3a
                                                          • Instruction ID: 1cdb7f40dcaf2c5b6f8298736c64605cc2d4e7cc8bd3ecd4195e4897365a2a63
                                                          • Opcode Fuzzy Hash: 2a486e199a1073192d2ab76fdaf9423da61f3946df1b212c46d744dd35da5e3a
                                                          • Instruction Fuzzy Hash: 5F319F71104740AFC320DF19C880B8BBBE8EF8D724F204A1EF59997390C779A945CB96
                                                          APIs
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,537E08AE,?,?,?,?,0042F588,000000FF,0041D0DF,?), ref: 0041D1DA
                                                          • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,?,?,0042F588,000000FF,0041D0DF,?), ref: 0041D1EE
                                                          • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,?,?,0042F588,000000FF,0041D0DF,?), ref: 0041D1F8
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                          Strings
                                                          • CDialog::MSG_CREATE_MESSAGE_BOX, xrefs: 0041D1F0
                                                          • CDialog::MSG_CREATE_MODAL_DLG, xrefs: 0041D1E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: MessageRegisterWindow$CreateEventException@8Throw_malloc
                                                          • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG
                                                          • API String ID: 1188034692-1515309323
                                                          • Opcode ID: e5df840c374edb4d314b405cf7927deab87bd118bdc003591a6cefdd6186986a
                                                          • Instruction ID: 8f30331a7d0a82c71c2cf135fcdddbf6783167e00fcd53bb43b2a30073ddcfa9
                                                          • Opcode Fuzzy Hash: e5df840c374edb4d314b405cf7927deab87bd118bdc003591a6cefdd6186986a
                                                          • Instruction Fuzzy Hash: 511179B1A00742AFC300CF15D880B56FBE8FB48760F504A3FE55483B50C378A854CB98
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,0041C818), ref: 0041B94E
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,0041C818), ref: 0041B95E
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0041B968
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041B972
                                                          • Sleep.KERNEL32(00000064), ref: 0041B97D
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0041B984
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0041B98E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Sleep
                                                          • String ID:
                                                          • API String ID: 2348874005-0
                                                          • Opcode ID: 89fbda83cfde529f4557547a284b07b53fde272b623b93481bab980feee85910
                                                          • Instruction ID: f1f9374e472945a2e4150c96b9f2f04068727bb37f025097168d847f170bca56
                                                          • Opcode Fuzzy Hash: 89fbda83cfde529f4557547a284b07b53fde272b623b93481bab980feee85910
                                                          • Instruction Fuzzy Hash: A6F0F96200E3A57DD71597789C80BDBFFD89F06224F48104AF38442602CB58E45CD3EE
                                                          APIs
                                                          • __getptd.LIBCMT ref: 0042DB91
                                                            • Part of subcall function 004244E3: __getptd_noexit.LIBCMT ref: 004244E6
                                                            • Part of subcall function 004244E3: __amsg_exit.LIBCMT ref: 004244F3
                                                          • __getptd.LIBCMT ref: 0042DBA2
                                                          • __getptd.LIBCMT ref: 0042DBB0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                          • String ID: MOC$csm
                                                          • API String ID: 803148776-1389381023
                                                          • Opcode ID: d1bdbd8c26c8a705d5a7a2af35c4b2a202de102865fc560031df8e0dd3ccf076
                                                          • Instruction ID: 47a718ef4add73cab02364874fd470c84c685f020952b3a97a078907d01c782d
                                                          • Opcode Fuzzy Hash: d1bdbd8c26c8a705d5a7a2af35c4b2a202de102865fc560031df8e0dd3ccf076
                                                          • Instruction Fuzzy Hash: A4E01A35B101248FC720AA66E146B2937A4EF84319F9600A7E408C7322C76DEA41964A
                                                          APIs
                                                            • Part of subcall function 00413180: _malloc.LIBCMT ref: 00413183
                                                            • Part of subcall function 00413180: __CxxThrowException@8.LIBCMT ref: 004131A1
                                                            • Part of subcall function 0040AC20: CloseHandle.KERNEL32(?,537E08AE,00000000,?,?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC63
                                                            • Part of subcall function 0040AC20: GetLastError.KERNEL32(?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC69
                                                            • Part of subcall function 0040AC20: CloseHandle.KERNEL32(?,537E08AE,00000000,?,?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC81
                                                            • Part of subcall function 0040AC20: GetLastError.KERNEL32(?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC87
                                                            • Part of subcall function 0040AC20: CloseHandle.KERNEL32(?,537E08AE,00000000,?,?,00000000,0042FD93,000000FF,004129BE), ref: 0040ACA1
                                                            • Part of subcall function 0040AC20: GetLastError.KERNEL32(?,00000000,0042FD93,000000FF,004129BE), ref: 0040ACA7
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000), ref: 004129CE
                                                          • GetLastError.KERNEL32 ref: 004129DA
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 004129F0
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412A02
                                                          • GetLastError.KERNEL32 ref: 00412A0F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$CloseCreateEventHandle$Exception@8Throw_malloc
                                                          • String ID:
                                                          • API String ID: 1759989790-0
                                                          • Opcode ID: 6b857cbb71be1ad28325e6d6b7d75c8c9f3b23fd950410c6b5f2775173ff0025
                                                          • Instruction ID: d29682d7f2a8e5d8ad5244a4e56567742131bd4529a3a95453868c643860fb60
                                                          • Opcode Fuzzy Hash: 6b857cbb71be1ad28325e6d6b7d75c8c9f3b23fd950410c6b5f2775173ff0025
                                                          • Instruction Fuzzy Hash: FF31BA712083009BC720DF19DA84A5BBBF5FBD8720F104A2EF955D7390D7B59884CBAA
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,537E08AE,00000000,?,?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC63
                                                          • GetLastError.KERNEL32(?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC69
                                                          • CloseHandle.KERNEL32(?,537E08AE,00000000,?,?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC81
                                                          • GetLastError.KERNEL32(?,00000000,0042FD93,000000FF,004129BE), ref: 0040AC87
                                                          • CloseHandle.KERNEL32(?,537E08AE,00000000,?,?,00000000,0042FD93,000000FF,004129BE), ref: 0040ACA1
                                                          • GetLastError.KERNEL32(?,00000000,0042FD93,000000FF,004129BE), ref: 0040ACA7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast
                                                          • String ID:
                                                          • API String ID: 918212764-0
                                                          • Opcode ID: 01571284487dd8332102ea27bf21fc6b24d93d877b32237917eca0345e84306e
                                                          • Instruction ID: dcfd2361e2e7680f2d61e14ae5f50a0f0a30a84fdfe528ae2696ca0788a1d8cd
                                                          • Opcode Fuzzy Hash: 01571284487dd8332102ea27bf21fc6b24d93d877b32237917eca0345e84306e
                                                          • Instruction Fuzzy Hash: 8D1193B16087418BE320CF25DD44B17B7E8FB40B60F11093EE89193780D73AE518CAAA
                                                          APIs
                                                          • __getptd.LIBCMT ref: 00428175
                                                            • Part of subcall function 004244E3: __getptd_noexit.LIBCMT ref: 004244E6
                                                            • Part of subcall function 004244E3: __amsg_exit.LIBCMT ref: 004244F3
                                                          • __amsg_exit.LIBCMT ref: 00428195
                                                          • __lock.LIBCMT ref: 004281A5
                                                          • InterlockedDecrement.KERNEL32(?), ref: 004281C2
                                                          • InterlockedIncrement.KERNEL32(023F1660), ref: 004281ED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                          • String ID:
                                                          • API String ID: 4271482742-0
                                                          • Opcode ID: fa3bbf27329c5f55e436b88aabd8abac842491f5a62691615a63079069034a17
                                                          • Instruction ID: fd241d50e1f8b1b7d4dc77b21c0c83e36747cdc79bc18032ab753e40f4628816
                                                          • Opcode Fuzzy Hash: fa3bbf27329c5f55e436b88aabd8abac842491f5a62691615a63079069034a17
                                                          • Instruction Fuzzy Hash: 72018E32B02632ABDA21AB65B94576E7760BF04714F86501FE800B32D0CB6C6952DBDD
                                                          APIs
                                                          • ResetEvent.KERNEL32(?), ref: 00415256
                                                          • GetLastError.KERNEL32 ref: 00415266
                                                          • SetEvent.KERNEL32(?), ref: 0041526C
                                                          • GetLastError.KERNEL32 ref: 00415276
                                                          • WaitForMultipleObjects.KERNEL32(00000002,00000000,00000000,000000FF), ref: 00415290
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventLast$MultipleObjectsResetWait
                                                          • String ID:
                                                          • API String ID: 234195192-0
                                                          • Opcode ID: 09ae9fbb8350569853272b2c8be73804df0dbc38018a1bb2ab0204f4601fc4bc
                                                          • Instruction ID: 01ba3faf78e38b84e446a84389ce2623cf67465c42dd92f621bab6ccc91c99b8
                                                          • Opcode Fuzzy Hash: 09ae9fbb8350569853272b2c8be73804df0dbc38018a1bb2ab0204f4601fc4bc
                                                          • Instruction Fuzzy Hash: B6019E751007019FD320DF64AC80AA7B3F4BBD4710F00892EE969C2740D774E948CF69
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000000,00000007,00000000,00000003,00000080,00000000), ref: 00407084
                                                          • _memset.LIBCMT ref: 0040709A
                                                          • GetFileInformationByHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0040710F), ref: 004070A8
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,0040710F), ref: 004070B3
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,0040710F), ref: 004070C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Handle$CloseFile$CreateInformation_memset
                                                          • String ID:
                                                          • API String ID: 1323354321-0
                                                          • Opcode ID: 0132f8f558b8720df98c9a6f2a9f479f48355388beba6bfe8d17b00a70df9ae5
                                                          • Instruction ID: 6e2f4fad45cc1b478236f34afacde46dc3ac694dbfc79934ddf445b22f007f0c
                                                          • Opcode Fuzzy Hash: 0132f8f558b8720df98c9a6f2a9f479f48355388beba6bfe8d17b00a70df9ae5
                                                          • Instruction Fuzzy Hash: B4F02E75945310BBD1246324AD0AF873B645F44B24F504B24FF69A61E0E7B4A50CC5DE
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041C1A0
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041C1AA
                                                          • PostMessageW.USER32(?,?,?,?), ref: 0041C1C5
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041C1D1
                                                          • CloseHandle.KERNEL32(?), ref: 0041C1D7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ObjectSingleWait$CloseCreateEventHandleMessagePost
                                                          • String ID:
                                                          • API String ID: 1259710111-0
                                                          • Opcode ID: da4c244dec537242234236758f76901cdaebeb962d90af1f950e35a4ae204856
                                                          • Instruction ID: 1c2131afe4bbbcb97152305221c9bc3684589986b6a1f07a80391251fe593e57
                                                          • Opcode Fuzzy Hash: da4c244dec537242234236758f76901cdaebeb962d90af1f950e35a4ae204856
                                                          • Instruction Fuzzy Hash: F6F0F975204700ABD224DF58EE44F17B7F9EB88720F108A19B666936D0C6B0E804CB64
                                                          APIs
                                                            • Part of subcall function 00423F42: _doexit.LIBCMT ref: 00423F4E
                                                          • ___set_flsgetvalue.LIBCMT ref: 00422019
                                                            • Part of subcall function 004242F5: TlsGetValue.KERNEL32(?,0042201E), ref: 004242FE
                                                            • Part of subcall function 004242F5: __decode_pointer.LIBCMT ref: 00424310
                                                            • Part of subcall function 004242F5: TlsSetValue.KERNEL32(00000000,0042201E), ref: 0042431F
                                                          • ___fls_getvalue@4.LIBCMT ref: 00422024
                                                            • Part of subcall function 004242D5: TlsGetValue.KERNEL32(?,?,00422029,00000000), ref: 004242E3
                                                          • ___fls_setvalue@8.LIBCMT ref: 00422037
                                                            • Part of subcall function 00424329: __decode_pointer.LIBCMT ref: 0042433A
                                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00422040
                                                          • ExitThread.KERNEL32 ref: 00422047
                                                          • GetCurrentThreadId.KERNEL32 ref: 0042204D
                                                          • __freefls@4.LIBCMT ref: 0042206D
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00422080
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                          • String ID:
                                                          • API String ID: 132634196-0
                                                          • Opcode ID: abb640ab18d0b5c1348d4bac514cf4b1efe66e005ced65b3c2dfaf410d7190e0
                                                          • Instruction ID: fd81764335df7765f2fb6b6443d515abc26e7ee03fb5a8222b8a574a8caa6766
                                                          • Opcode Fuzzy Hash: abb640ab18d0b5c1348d4bac514cf4b1efe66e005ced65b3c2dfaf410d7190e0
                                                          • Instruction Fuzzy Hash: 26E04F35B00235B78F107BB3BE0A99F362CDD91389F810056BB1493516DAACA952C6BD
                                                          APIs
                                                            • Part of subcall function 00404E70: _malloc.LIBCMT ref: 00404E89
                                                            • Part of subcall function 00404E70: __CxxThrowException@8.LIBCMT ref: 00404EA7
                                                            • Part of subcall function 00421DEE: __lock.LIBCMT ref: 00421E0C
                                                            • Part of subcall function 00421DEE: ___sbh_find_block.LIBCMT ref: 00421E17
                                                            • Part of subcall function 00421DEE: ___sbh_free_block.LIBCMT ref: 00421E26
                                                            • Part of subcall function 00421DEE: RtlFreeHeap.NTDLL(00000000,?,00437B30,0000000C,004244D4,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C), ref: 00421E56
                                                            • Part of subcall function 00421DEE: GetLastError.KERNEL32(?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA,?,?,?,0042458E,0000000D), ref: 00421E67
                                                            • Part of subcall function 004080C0: FindNextFileW.KERNELBASE(537E08AE,?,?,00000000), ref: 004080ED
                                                          • FindClose.KERNEL32(?,?,mia.lib), ref: 0041FDD6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseErrorException@8FileFreeHeapLastNextThrow___sbh_find_block___sbh_free_block__lock_malloc
                                                          • String ID: mia.lib
                                                          • API String ID: 2885634111-3926378727
                                                          • Opcode ID: 2ae7be12f441ca50a6143c3c0eb0cee28d23eb9b5f221ca52f3f51d27e8a3092
                                                          • Instruction ID: 8b4ee6a9bcb3ced087b9b546e1ec6741e99afcab16ee143dc5f2577b8edc9a86
                                                          • Opcode Fuzzy Hash: 2ae7be12f441ca50a6143c3c0eb0cee28d23eb9b5f221ca52f3f51d27e8a3092
                                                          • Instruction Fuzzy Hash: DDB19F716083808FC720DF28C88079BB7E1BF95318F544A2EE5D997351D739A98AC79B
                                                          APIs
                                                          • _malloc.LIBCMT ref: 00417D8A
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 00417DA8
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID: C&B$P!@
                                                          • API String ID: 2732643326-2732990258
                                                          • Opcode ID: ef0825c52d97dfa396775a1bbff741b6f9787908cb828aca66d1adbd8e82940c
                                                          • Instruction ID: 6c4891182d0843430d5aa2e3f13a61663bb5cfbeeb03675ddc0dc77422dc16fb
                                                          • Opcode Fuzzy Hash: ef0825c52d97dfa396775a1bbff741b6f9787908cb828aca66d1adbd8e82940c
                                                          • Instruction Fuzzy Hash: 860192716017109FC324CF69D845957B7E4FF89750B00C92EE5668B750C778E545CB94
                                                          APIs
                                                          • ___BuildCatchObject.LIBCMT ref: 0042E1E8
                                                            • Part of subcall function 0042E143: ___BuildCatchObjectHelper.LIBCMT ref: 0042E179
                                                          • _UnwindNestedFrames.LIBCMT ref: 0042E1FF
                                                          • ___FrameUnwindToState.LIBCMT ref: 0042E20D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                          • String ID: csm
                                                          • API String ID: 2163707966-1018135373
                                                          • Opcode ID: a1cdc47254b0d1e876ebf16cdfd679722edd35116a1de451e27b255c7f3a5f87
                                                          • Instruction ID: 501dba1919913278d24567a8fb0c29bd8aa274bf433fc8a0c0296e56aab0cabf
                                                          • Opcode Fuzzy Hash: a1cdc47254b0d1e876ebf16cdfd679722edd35116a1de451e27b255c7f3a5f87
                                                          • Instruction Fuzzy Hash: 86014B3150112ABBCF126F52EC45EEB7F6AEF18344F444016BC1815121DB7A99B1DBA8
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00429771
                                                          • __isleadbyte_l.LIBCMT ref: 004297A5
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,0042592B,?,00000000,00000000,?,?,?,?,0042592B,00000000,?), ref: 004297D6
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,0042592B,00000001,00000000,00000000,?,?,?,?,0042592B,00000000,?), ref: 00429844
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: b427793e77801bdb7ba370c3e6adb68a2c31af849afecf8bb8cfe1dd9eb1ff06
                                                          • Instruction ID: 9c24f66b49e3da99480367bb5e631a60a5aacc6aab19caaf07062d906febf1f7
                                                          • Opcode Fuzzy Hash: b427793e77801bdb7ba370c3e6adb68a2c31af849afecf8bb8cfe1dd9eb1ff06
                                                          • Instruction Fuzzy Hash: 9D31F331B20366EFDB10EF64E8809AE3BB4FF41310F58456AE0658B291D334DD40DB58
                                                          APIs
                                                          • VirtualFree.KERNEL32(?,00000000,00008000,537E08AE,?,000000FF,0042EA77,000000FF,00414134,?), ref: 004142C3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FreeVirtual
                                                          • String ID: JA$0?A$PJA
                                                          • API String ID: 1263568516-2687202105
                                                          • Opcode ID: 2d88bd622d4eed4683b29214fa8f1cad973849dcd576eb5995ac585f71bd9563
                                                          • Instruction ID: 57a710f7211706a9fe31a66cfd9e96bb7129449c188aa58f507e00ff06fc2ee7
                                                          • Opcode Fuzzy Hash: 2d88bd622d4eed4683b29214fa8f1cad973849dcd576eb5995ac585f71bd9563
                                                          • Instruction Fuzzy Hash: 63316D74204B818FC320CF55C844B97B7E8BF88754F148A4DE5969B790C7B9F849CB99
                                                          APIs
                                                          • _malloc.LIBCMT ref: 00415125
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 00415143
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          • _malloc.LIBCMT ref: 0041516C
                                                          • __CxxThrowException@8.LIBCMT ref: 00415188
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw_malloc$AllocateExceptionHeapRaise
                                                          • String ID:
                                                          • API String ID: 82271797-0
                                                          • Opcode ID: 628c01bc56a7d7ebefc01971975c629e826112fae3ae03c7ba76f33a046b030a
                                                          • Instruction ID: def4db18d05b99ab4d6b26ffbfca84adb2a4381ad4f7d30a934532bce5ddbadc
                                                          • Opcode Fuzzy Hash: 628c01bc56a7d7ebefc01971975c629e826112fae3ae03c7ba76f33a046b030a
                                                          • Instruction Fuzzy Hash: 0A217CB1A04751AFC320DF1AC881A4AFBE4FF9C714F508A2EF49983350D739A945CB96
                                                          APIs
                                                          • GetWindowTextLengthW.USER32 ref: 00408A15
                                                          • GetLastError.KERNEL32 ref: 00408A21
                                                          • GetWindowTextW.USER32(?,?,00000001), ref: 00408A4B
                                                          • GetLastError.KERNEL32 ref: 00408A77
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastTextWindow$Length
                                                          • String ID:
                                                          • API String ID: 3440162706-0
                                                          • Opcode ID: e8e012cd79b6b6bd25b8c7b73373170b438c3aa796ec5f42770a3d37ac7ff58f
                                                          • Instruction ID: b6694d03e0650564e1b12933c6f234b168eb3154b6e7cc2141c97879f5f5d7ed
                                                          • Opcode Fuzzy Hash: e8e012cd79b6b6bd25b8c7b73373170b438c3aa796ec5f42770a3d37ac7ff58f
                                                          • Instruction Fuzzy Hash: 9C118B352145128FDB24DF38F94491BB3E5EFD4710714957EE086D3B94EB34E882CA94
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00415462
                                                          • SetEvent.KERNEL32(?), ref: 00415484
                                                          • GetLastError.KERNEL32 ref: 0041548A
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00415492
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ObjectSingleWait$ErrorEventLast
                                                          • String ID:
                                                          • API String ID: 3117263442-0
                                                          • Opcode ID: 6a9d534bb34e468436ed8922fd9e4c3005a7b31566cd882573cdaab6cdfd99fd
                                                          • Instruction ID: d9c54cf6459ccd85d0f03389fa364b2fe510f0e71b5d1dca3e53b888f90a5fab
                                                          • Opcode Fuzzy Hash: 6a9d534bb34e468436ed8922fd9e4c3005a7b31566cd882573cdaab6cdfd99fd
                                                          • Instruction Fuzzy Hash: E0F03675104B059FD720DB69DD40A5BB3E86B89630B104B19E265933A0C774F8818758
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventLastReset
                                                          • String ID:
                                                          • API String ID: 1621066496-0
                                                          • Opcode ID: f7a27fea00bfa5551196a168a4661de4bb9f1662255f7ccbc6010f2a403cdef1
                                                          • Instruction ID: 67aa9b638b15eb6519ceb2daf01db011a7dda1e32d9d81611401a8271e3f4563
                                                          • Opcode Fuzzy Hash: f7a27fea00bfa5551196a168a4661de4bb9f1662255f7ccbc6010f2a403cdef1
                                                          • Instruction Fuzzy Hash: 74F0827A600705CF8734AF6AEE80857B7F8EF88251301487ADA55D3211D7B4F895CBA8
                                                          APIs
                                                          • __getptd.LIBCMT ref: 00427ED9
                                                            • Part of subcall function 004244E3: __getptd_noexit.LIBCMT ref: 004244E6
                                                            • Part of subcall function 004244E3: __amsg_exit.LIBCMT ref: 004244F3
                                                          • __getptd.LIBCMT ref: 00427EF0
                                                          • __amsg_exit.LIBCMT ref: 00427EFE
                                                          • __lock.LIBCMT ref: 00427F0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                          • String ID:
                                                          • API String ID: 3521780317-0
                                                          • Opcode ID: 05403a0301a6ba57545f7ca89f60679739f76aad3f481758a75143d10c6437fd
                                                          • Instruction ID: 33523e4aa4e58cc1d750080c8846bc6e86dc2b4c69a7a1b864837c0295b8a662
                                                          • Opcode Fuzzy Hash: 05403a0301a6ba57545f7ca89f60679739f76aad3f481758a75143d10c6437fd
                                                          • Instruction Fuzzy Hash: 66F09632B0C3309AD721BB65B50675D73A0AF40728F92415FE450A73D1CBBC5A01DB9E
                                                          APIs
                                                          • _malloc.LIBCMT ref: 00411BC8
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 00411BE4
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID: AC
                                                          • API String ID: 2732643326-3250319772
                                                          • Opcode ID: 934699a12a52b3141aafc0e45caf1c944e9b6928602c3da0ff549bbca788445f
                                                          • Instruction ID: ab5f602e63adf12e9f9b42bdfad0bbc760dd87d5a89e028d2f0e125979789b22
                                                          • Opcode Fuzzy Hash: 934699a12a52b3141aafc0e45caf1c944e9b6928602c3da0ff549bbca788445f
                                                          • Instruction Fuzzy Hash: 9A11E1B12047018FC324DF19D881B57B3E4EB88714F004A2EE596C73A1E738E848CB96
                                                          APIs
                                                          • _malloc.LIBCMT ref: 0040C082
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 0040C09E
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID: C&B
                                                          • API String ID: 2732643326-3599845651
                                                          • Opcode ID: 5f8e0597f3182be47e06ce787f4affd8efcdedbadb727185b073082a8d2aa648
                                                          • Instruction ID: 673f2574accb9efc1f410de1bcad0332c86955ef32305ba439929ca51ee66969
                                                          • Opcode Fuzzy Hash: 5f8e0597f3182be47e06ce787f4affd8efcdedbadb727185b073082a8d2aa648
                                                          • Instruction Fuzzy Hash: B62167B1604B42EFC314CF5AD880A46FBF8FB88714F508A2FE15883740D379A959CBA5
                                                          APIs
                                                            • Part of subcall function 0042D933: __getptd.LIBCMT ref: 0042D939
                                                            • Part of subcall function 0042D933: __getptd.LIBCMT ref: 0042D949
                                                          • __getptd.LIBCMT ref: 0042DF5D
                                                            • Part of subcall function 004244E3: __getptd_noexit.LIBCMT ref: 004244E6
                                                            • Part of subcall function 004244E3: __amsg_exit.LIBCMT ref: 004244F3
                                                          • __getptd.LIBCMT ref: 0042DF6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                          • String ID: csm
                                                          • API String ID: 803148776-1018135373
                                                          • Opcode ID: 199eeb7c63e04620263b730f4c137685cbdcdb6679406dd5ea4a7cea4fc582b9
                                                          • Instruction ID: bf84cde6f23fa0aa79f4f710d2ea78ec4cd8ee9a8d4c5decabd064020991354a
                                                          • Opcode Fuzzy Hash: 199eeb7c63e04620263b730f4c137685cbdcdb6679406dd5ea4a7cea4fc582b9
                                                          • Instruction Fuzzy Hash: EB012874E002248ECF34EF21F640AAEB3F5AF50315F96442FE08256691CB788AA1CA5D
                                                          APIs
                                                          • _malloc.LIBCMT ref: 00418227
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 00418245
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID: C&B
                                                          • API String ID: 2732643326-3599845651
                                                          • Opcode ID: 0018449c9cc5969ef64ad9f66a75052b5252505b41bac9490c8dbc4052e981ae
                                                          • Instruction ID: 3e576634322811acd3d1ac759d3a191cb1e7305ee3e78df6768dc5e4f091bde8
                                                          • Opcode Fuzzy Hash: 0018449c9cc5969ef64ad9f66a75052b5252505b41bac9490c8dbc4052e981ae
                                                          • Instruction Fuzzy Hash: 79E022B09007106AC7215BE098012C7B7D0AB46754F01ED5FF68587201CB7CA408879A
                                                          APIs
                                                          • _malloc.LIBCMT ref: 00416493
                                                            • Part of subcall function 00421ECB: __FF_MSGBANNER.LIBCMT ref: 00421EEE
                                                            • Part of subcall function 00421ECB: __NMSG_WRITE.LIBCMT ref: 00421EF5
                                                            • Part of subcall function 00421ECB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00424AEF,?,00000001,?,?,00422F29,00000018,00437BF8,0000000C,00422FBA), ref: 00421F42
                                                          • __CxxThrowException@8.LIBCMT ref: 004164B1
                                                            • Part of subcall function 0042D9E5: RaiseException.KERNEL32(?,?,?,00404EAC,?,?,?,?,?,00404EAC,?,00438008), ref: 0042DA27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2336371632.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2336350732.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336408717.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336433814.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2336458064.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID: C&B
                                                          • API String ID: 2732643326-3599845651
                                                          • Opcode ID: 03b8cf24b1c06656392e758bb381557a573019dbe4851daa8f3d5fbae38c5826
                                                          • Instruction ID: 11d43d463d30091cd7fc968f8fd7abacb3bf7297c3e1db42a875208d6af1d08c
                                                          • Opcode Fuzzy Hash: 03b8cf24b1c06656392e758bb381557a573019dbe4851daa8f3d5fbae38c5826
                                                          • Instruction Fuzzy Hash: 5AE092F05083409ECB088F14E80A887BBE4AB45304F06D4AFF4098B363C778D509CB5E

                                                          Execution Graph

                                                          Execution Coverage:8.2%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:0.5%
                                                          Total number of Nodes:1973
                                                          Total number of Limit Nodes:25
                                                          execution_graph 39064 1000e070 39065 1000e082 39064->39065 39068 1000e08c 39064->39068 39066 10012a20 VirtualAlloc 39065->39066 39066->39068 39067 1000e093 39068->39067 39069 10002f54 101 API calls 39068->39069 39069->39068 36747 10005761 36748 1000576e 36747->36748 36749 1000577f 36747->36749 36748->36749 36753 100057a0 36748->36753 36754 100057aa __EH_prolog 36753->36754 36768 100015ec 36754->36768 36759 100015ec ctype 29 API calls 36760 100057f0 36759->36760 36761 100015a7 ctype 29 API calls 36760->36761 36762 100057fb 36761->36762 36777 100033a2 29 API calls 2 library calls 36762->36777 36764 10005779 36765 1000109b 36764->36765 36812 100189ee 36765->36812 36778 10001601 36768->36778 36771 100015a7 36772 100015ce 36771->36772 36773 100015ec ctype 29 API calls 36772->36773 36774 100015d6 36773->36774 36775 1000109b ctype 29 API calls 36774->36775 36776 100015de 36775->36776 36776->36759 36777->36764 36781 10005905 36778->36781 36779 100015f3 36779->36771 36783 1000591c 36781->36783 36782 10005954 36782->36779 36783->36782 36785 1000109b ctype 29 API calls 36783->36785 36786 100039c8 36783->36786 36785->36783 36787 100039d2 __EH_prolog 36786->36787 36788 100015a7 ctype 29 API calls 36787->36788 36789 100039ed 36788->36789 36790 100015a7 ctype 29 API calls 36789->36790 36791 100039fc 36790->36791 36792 100015ec ctype 29 API calls 36791->36792 36793 10003a16 36792->36793 36794 100015a7 ctype 29 API calls 36793->36794 36795 10003a21 36794->36795 36796 100015ec ctype 29 API calls 36795->36796 36797 10003a38 36796->36797 36798 100015a7 ctype 29 API calls 36797->36798 36799 10003a43 36798->36799 36802 10003600 36799->36802 36803 1000360a __EH_prolog 36802->36803 36804 100015a7 ctype 29 API calls 36803->36804 36805 10003620 36804->36805 36806 100015a7 ctype 29 API calls 36805->36806 36807 1000362c 36806->36807 36808 100015a7 ctype 29 API calls 36807->36808 36809 10003638 36808->36809 36810 100015a7 ctype 29 API calls 36809->36810 36811 10003644 36810->36811 36811->36783 36813 100010a4 36812->36813 36814 10018a1c 36812->36814 36813->36749 36815 10018a61 36814->36815 36816 10018a26 36814->36816 36826 10018a52 36815->36826 36832 1001a13a 29 API calls ctype 36815->36832 36829 1001a13a 29 API calls ctype 36816->36829 36818 10018aba HeapFree 36818->36813 36820 10018a2d ctype 36821 10018a47 36820->36821 36830 1001a53c VirtualFree VirtualFree HeapFree ctype 36820->36830 36831 10018a58 LeaveCriticalSection ctype 36821->36831 36823 10018a6d ctype 36824 10018a99 36823->36824 36833 1001b2c3 VirtualFree HeapFree VirtualFree ctype 36823->36833 36834 10018ab0 LeaveCriticalSection ctype 36824->36834 36826->36813 36826->36818 36829->36820 36830->36821 36831->36826 36832->36823 36833->36824 36834->36826 39070 6c8228b0 39071 6c8228f6 39070->39071 39072 6c8228bd 39070->39072 39072->39071 39076 6c822bf0 39072->39076 39077 6c822c0a 39076->39077 39078 6c822bf9 FreeLibrary 39076->39078 39079 6c822c13 DeleteFileW 39077->39079 39080 6c8228f1 39077->39080 39078->39077 39079->39080 39081 6c822a30 39080->39081 39082 6c822a94 39081->39082 39083 6c822b5b 39082->39083 39094 6c822aac _memset 39082->39094 39110 6c822c40 70 API calls ___endstdio 39083->39110 39085 6c822b65 39086 6c822b76 FindResourceW 39085->39086 39088 6c822bb2 39085->39088 39087 6c822b88 39086->39087 39086->39088 39100 6c822980 LoadResource 39087->39100 39090 6c8251c7 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 39088->39090 39092 6c822bdd 39090->39092 39091 6c822b94 39091->39088 39093 6c822ba6 LoadLibraryW 39091->39093 39092->39071 39093->39088 39095 6c822b13 FindFirstFileW 39094->39095 39096 6c822b72 39095->39096 39097 6c822b2d 39095->39097 39096->39086 39098 6c822b3b LoadLibraryW FindClose 39097->39098 39099 6c822b54 39098->39099 39099->39088 39101 6c822a1b 39100->39101 39102 6c82299f SizeofResource 39100->39102 39101->39091 39102->39101 39103 6c8229ad LockResource 39102->39103 39103->39101 39104 6c8229ba CreateFileW 39103->39104 39104->39101 39105 6c8229dc WriteFile 39104->39105 39106 6c8229ef CloseHandle 39105->39106 39108 6c822a10 39106->39108 39109 6c822a04 DeleteFileW 39106->39109 39108->39091 39109->39108 39110->39085 39111 6c823ef0 39127 6c823f2d 39111->39127 39112 6c825f2a _malloc 67 API calls 39113 6c824333 39112->39113 39114 6c82434d 39113->39114 39129 6c82663b RaiseException 39113->39129 39116 6c821230 68 API calls 39114->39116 39117 6c82435a 39116->39117 39118 6c8182b0 266 API calls 39117->39118 39119 6c82437e 39118->39119 39130 6c821a40 68 API calls 39119->39130 39121 6c82439e 39122 6c8240d3 39121->39122 39123 6c8243d5 39121->39123 39131 6c825bd8 6 API calls _memmove_s 39121->39131 39125 6c8243e0 39123->39125 39132 6c825bd8 6 API calls _memmove_s 39123->39132 39125->39122 39133 6c825bd8 6 API calls _memmove_s 39125->39133 39127->39112 39127->39122 39129->39114 39130->39121 39131->39123 39132->39125 39133->39122 39134 10019fd5 39135 10019fe8 39134->39135 39138 10019ff1 39134->39138 39141 1001a019 39135->39141 39173 100032c6 GetVersionExA 39135->39173 39138->39135 39138->39141 39144 10019efc 39138->39144 39139 1001a025 39140 1001a039 39139->39140 39139->39141 39142 10019efc 105 API calls 39139->39142 39140->39141 39143 10019efc 105 API calls 39140->39143 39142->39140 39143->39141 39145 10019f91 39144->39145 39146 10019f09 GetVersion 39144->39146 39148 10019fc3 39145->39148 39153 10019f97 39145->39153 39174 1001a3c4 HeapCreate 39146->39174 39149 1001c098 31 API calls 39148->39149 39151 10019f5c 39148->39151 39149->39151 39150 10019f1b 39150->39151 39186 1001bfac 37 API calls 39150->39186 39151->39135 39152 10019fb2 39199 1001c8f1 30 API calls ctype 39152->39199 39153->39151 39153->39152 39198 1001c22d 32 API calls 39153->39198 39157 10019fb7 39200 1001c000 35 API calls 39157->39200 39158 10019f53 39160 10019f60 GetCommandLineA 39158->39160 39161 10019f57 39158->39161 39194 1001cc4b 37 API calls ctype 39160->39194 39187 1001a421 39161->39187 39162 10019fbc 39166 1001a421 6 API calls 39162->39166 39165 10019f70 39195 1001c735 34 API calls ctype 39165->39195 39166->39151 39168 10019f7a 39196 1001c9fe 49 API calls ctype 39168->39196 39170 10019f7f 39197 1001c945 48 API calls ctype 39170->39197 39172 10019f84 39172->39151 39173->39139 39175 1001a3e4 39174->39175 39176 1001a41a 39174->39176 39201 1001a27c 57 API calls 39175->39201 39176->39150 39178 1001a3e9 39179 1001a400 39178->39179 39180 1001a3f3 39178->39180 39182 1001a41d 39179->39182 39203 1001b010 5 API calls ctype 39179->39203 39202 1001a4c9 HeapAlloc 39180->39202 39182->39150 39183 1001a3fd 39183->39182 39185 1001a40e HeapDestroy 39183->39185 39185->39176 39186->39158 39188 1001a493 39187->39188 39191 1001a42d 39187->39191 39189 1001a4ba HeapDestroy 39188->39189 39193 1001a4a6 VirtualFree 39188->39193 39189->39151 39190 1001a47f HeapFree 39190->39189 39191->39190 39192 1001a44d VirtualFree VirtualFree HeapFree 39191->39192 39192->39190 39192->39192 39193->39188 39194->39165 39195->39168 39196->39170 39197->39172 39198->39152 39199->39157 39200->39162 39201->39178 39202->39183 39203->39183 39204 10002175 39205 10002182 39204->39205 39209 10002193 39204->39209 39205->39209 39210 1000219a 39205->39210 39208 1000109b ctype 29 API calls 39208->39209 39211 100021a4 __EH_prolog 39210->39211 39214 10012a40 39211->39214 39215 1000218d 39214->39215 39216 10012a44 VirtualFree 39214->39216 39215->39208 39216->39215 36835 10019d87 36841 1001a072 7 API calls ctype 36835->36841 36837 10019d8e GetCurrentThreadId 36838 10019da0 36837->36838 36842 10019de9 36838->36842 36841->36837 36843 10019df2 36842->36843 36850 1001c031 GetLastError TlsGetValue 36843->36850 36845 10019dfa 36846 10019e07 36845->36846 36883 1001a072 7 API calls ctype 36845->36883 36861 1001c098 36846->36861 36851 1001c04d 36850->36851 36852 1001c08c SetLastError 36850->36852 36884 1001c480 36851->36884 36852->36845 36855 1001c084 36895 1001a072 7 API calls ctype 36855->36895 36856 1001c05e TlsSetValue 36856->36855 36857 1001c06f 36856->36857 36860 1001c075 GetCurrentThreadId 36857->36860 36859 1001c08b 36859->36852 36860->36852 36862 10019e0e ExitThread 36861->36862 36863 1001c0a6 36861->36863 36864 1001c0bc 36863->36864 36865 1001c0af TlsGetValue 36863->36865 36867 1001c0c9 36864->36867 36868 100189ee ctype 29 API calls 36864->36868 36865->36864 36866 1001c128 TlsSetValue 36865->36866 36866->36862 36869 1001c0d7 36867->36869 36871 100189ee ctype 29 API calls 36867->36871 36868->36867 36870 1001c0e5 36869->36870 36872 100189ee ctype 29 API calls 36869->36872 36873 1001c0f3 36870->36873 36874 100189ee ctype 29 API calls 36870->36874 36871->36869 36872->36870 36875 1001c101 36873->36875 36876 100189ee ctype 29 API calls 36873->36876 36874->36873 36877 100189ee ctype 29 API calls 36875->36877 36878 1001c10f 36875->36878 36876->36875 36877->36878 36879 100189ee ctype 29 API calls 36878->36879 36881 1001c120 36878->36881 36879->36881 36880 100189ee ctype 29 API calls 36882 1001c127 36880->36882 36881->36880 36882->36866 36883->36846 36894 1001c4b5 ctype 36884->36894 36885 1001c056 36885->36855 36885->36856 36887 1001c56d HeapAlloc 36887->36894 36893 1001c52f 36893->36887 36893->36894 36899 1001a13a 29 API calls ctype 36893->36899 36900 1001b308 6 API calls ctype 36893->36900 36901 1001c5a2 LeaveCriticalSection ctype 36893->36901 36894->36885 36894->36887 36894->36893 36896 1001a13a 29 API calls ctype 36894->36896 36897 1001a865 5 API calls ctype 36894->36897 36898 1001c519 LeaveCriticalSection ctype 36894->36898 36895->36859 36896->36894 36897->36894 36898->36894 36899->36893 36900->36893 36901->36893 36902 10002828 36903 10002837 36902->36903 36904 1000282e 36902->36904 36905 10002856 36903->36905 36906 1000284c LeaveCriticalSection 36903->36906 36917 6c8019c0 36903->36917 36909 6c801ab0 36904->36909 36906->36905 36910 6c801ad0 SetFilePointer 36909->36910 36911 6c801ac3 36909->36911 36912 6c801b01 GetLastError 36910->36912 36913 6c801b0b 36910->36913 36911->36903 36912->36913 36914 6c801b25 36913->36914 36915 6c801b2f GetLastError 36913->36915 36914->36903 36916 6c801b35 36915->36916 36916->36903 36918 6c8019d2 ReadFile 36917->36918 36919 6c8019cd 36917->36919 36920 6c8019fd 36918->36920 36919->36918 36921 6c801a06 36920->36921 36922 6c801a0c GetLastError 36920->36922 36921->36906 36923 6c801a16 36922->36923 36923->36906 36924 6c82658b 36925 6c826596 36924->36925 36926 6c82659b 36924->36926 36938 6c82a8ed GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 36925->36938 36930 6c826495 36926->36930 36929 6c8265a9 36932 6c8264a1 ___lock_fhandle 36930->36932 36931 6c8264ee ___DllMainCRTStartup 36933 6c82653e ___lock_fhandle 36931->36933 36935 6c82651e 36931->36935 36937 6c826360 __CRT_INIT@12 156 API calls 36931->36937 36932->36931 36932->36933 36939 6c826360 36932->36939 36933->36929 36935->36933 36936 6c826360 __CRT_INIT@12 156 API calls 36935->36936 36936->36933 36937->36935 36938->36926 36940 6c8263eb 36939->36940 36941 6c82636f 36939->36941 36943 6c826422 36940->36943 36944 6c8263f1 36940->36944 36988 6c8293e1 HeapCreate 36941->36988 36945 6c826480 36943->36945 36946 6c826427 36943->36946 36950 6c82640c 36944->36950 36956 6c82637a 36944->36956 36999 6c827a46 67 API calls _doexit 36944->36999 36945->36956 37008 6c827404 79 API calls 2 library calls 36945->37008 37003 6c8270ea 8 API calls __decode_pointer 36946->37003 36949 6c826381 36990 6c827472 78 API calls 8 library calls 36949->36990 36950->36956 37000 6c827ee0 68 API calls ___endstdio 36950->37000 36952 6c82642c 37004 6c827653 67 API calls __calloc_impl 36952->37004 36956->36931 36958 6c826386 __RTC_Initialize 36961 6c82638a 36958->36961 36966 6c826396 GetCommandLineA 36958->36966 36959 6c826416 37001 6c82711e 70 API calls 2 library calls 36959->37001 36960 6c826438 36960->36956 37005 6c82706f 6 API calls __crt_waiting_on_module_handle 36960->37005 36991 6c829411 VirtualFree HeapFree HeapFree HeapDestroy 36961->36991 36964 6c82638f 36964->36956 36965 6c82641b 37002 6c829411 VirtualFree HeapFree HeapFree HeapDestroy 36965->37002 36992 6c82a76a 76 API calls 3 library calls 36966->36992 36970 6c826456 36973 6c826474 36970->36973 36974 6c82645d 36970->36974 36971 6c8263a6 36993 6c827c8c 72 API calls 2 library calls 36971->36993 37007 6c825ff4 67 API calls 7 library calls 36973->37007 37006 6c82715b 67 API calls 5 library calls 36974->37006 36975 6c8263b0 36986 6c8263b4 36975->36986 36995 6c82a6af 112 API calls 3 library calls 36975->36995 36978 6c826464 GetCurrentThreadId 36978->36956 36981 6c8263d4 36981->36964 36998 6c827ee0 68 API calls ___endstdio 36981->36998 36982 6c8263c0 36982->36981 36996 6c82a437 111 API calls 6 library calls 36982->36996 36985 6c8263c9 36985->36981 36997 6c82787f 74 API calls 5 library calls 36985->36997 36994 6c82711e 70 API calls 2 library calls 36986->36994 36989 6c826375 36988->36989 36989->36949 36989->36956 36990->36958 36991->36964 36992->36971 36993->36975 36994->36961 36995->36982 36996->36985 36997->36981 36998->36986 36999->36950 37000->36959 37001->36965 37002->36956 37003->36952 37004->36960 37005->36970 37006->36978 37007->36964 37008->36956 37009 6c823c8e 37011 6c823bd7 37009->37011 37010 6c823d60 37011->37010 37014 6c8182b0 37011->37014 37013 6c823c62 37119 6c80f940 37014->37119 37016 6c818305 37017 6c818329 37016->37017 37329 6c82663b RaiseException 37016->37329 37127 6c804dd0 37017->37127 37022 6c818340 37137 6c803be0 37022->37137 37025 6c818395 37152 6c8042e0 37025->37152 37032 6c8183d0 37216 6c816cc0 37032->37216 37036 6c81846d 37235 6c8172f0 37036->37235 37039 6c818498 37062 6c8184b7 37039->37062 37334 6c82663b RaiseException 37039->37334 37040 6c81841b 37040->37036 37333 6c82663b RaiseException 37040->37333 37042 6c818834 37240 6c8109e0 37042->37240 37044 6c818c70 37293 6c814c00 37044->37293 37046 6c818819 37347 6c82663b RaiseException 37046->37347 37047 6c818cfe 37359 6c82663b RaiseException 37047->37359 37048 6c818d65 37361 6c82663b RaiseException 37048->37361 37050 6c818cb4 37050->37047 37051 6c818ce9 37050->37051 37054 6c818d19 37050->37054 37357 6c82663b RaiseException 37050->37357 37358 6c82663b RaiseException 37051->37358 37054->37048 37057 6c818d4a 37054->37057 37109 6c818af7 37054->37109 37055 6c818d80 37362 6c82663b RaiseException 37055->37362 37360 6c82663b RaiseException 37057->37360 37061 6c818d9d 37363 6c82663b RaiseException 37061->37363 37062->37042 37062->37044 37062->37046 37335 6c82e5ce 68 API calls 6 library calls 37062->37335 37065 6c818531 37077 6c81854a 37065->37077 37336 6c8193a0 68 API calls ___endstdio 37065->37336 37066 6c818db8 37364 6c82663b RaiseException 37066->37364 37069 6c818dd3 37071 6c818b71 37071->37013 37072 6c81883b 37245 6c810880 37072->37245 37074 6c8189c1 37075 6c8189eb 37074->37075 37348 6c805290 68 API calls 2 library calls 37074->37348 37253 6c808ab0 37075->37253 37337 6c81a7b0 CharUpperW CharUpperW 37077->37337 37080 6c81866d 37081 6c818671 37080->37081 37082 6c81868c 37080->37082 37338 6c82663b RaiseException 37081->37338 37339 6c81b9c0 214 API calls __CxxThrowException@8 37082->37339 37083 6c818aa3 37087 6c818c55 37083->37087 37088 6c818aae 37083->37088 37084 6c818a88 37351 6c82663b RaiseException 37084->37351 37356 6c82663b RaiseException 37087->37356 37094 6c818b95 37088->37094 37097 6c818ad8 37088->37097 37089 6c818a3e 37089->37083 37089->37084 37089->37088 37090 6c818a6d 37089->37090 37349 6c82663b RaiseException 37089->37349 37350 6c82663b RaiseException 37090->37350 37113 6c818bb4 37094->37113 37354 6c82663b RaiseException 37094->37354 37096 6c818728 37098 6c818733 37096->37098 37099 6c8187fe 37096->37099 37097->37109 37352 6c82663b RaiseException 37097->37352 37111 6c818752 37098->37111 37343 6c82663b RaiseException 37098->37343 37346 6c82663b RaiseException 37099->37346 37100 6c81870d 37342 6c82663b RaiseException 37100->37342 37101 6c8186b2 37101->37096 37101->37098 37101->37100 37104 6c8186f2 37101->37104 37340 6c82663b RaiseException 37101->37340 37341 6c82663b RaiseException 37104->37341 37353 6c818de0 67 API calls 37109->37353 37344 6c818270 EnterCriticalSection LeaveCriticalSection 37111->37344 37355 6c818de0 67 API calls 37113->37355 37115 6c818c2e 37115->37013 37116 6c818796 37345 6c818de0 67 API calls 37116->37345 37118 6c8187da 37118->37013 37120 6c80f97d 37119->37120 37365 6c808180 37120->37365 37122 6c80f9be 37369 6c8102c0 37122->37369 37125 6c80f9de 37126 6c80fb0c 37125->37126 37373 6c804d10 37125->37373 37126->37016 37131 6c804de9 37127->37131 37128 6c804e2a 37130 6c804e60 37128->37130 37384 6c8255f0 __VEC_memcpy 37128->37384 37133 6c817df0 37130->37133 37131->37128 37383 6c825ff4 67 API calls 7 library calls 37131->37383 37134 6c817e4b 37133->37134 37385 6c817c10 37134->37385 37136 6c817ecb 37136->37022 37395 6c80fc80 37137->37395 37139 6c803c1c 37400 6c8253fe 37139->37400 37143 6c803c2d 37144 6c8253fe __fileno 67 API calls 37143->37144 37145 6c803c43 37144->37145 37146 6c82539a __write_nolock 67 API calls 37145->37146 37147 6c803c49 37146->37147 37148 6c8253fe __fileno 67 API calls 37147->37148 37149 6c803c5f 37148->37149 37150 6c82539a __write_nolock 67 API calls 37149->37150 37151 6c803c65 37150->37151 37151->37025 37330 6c82663b RaiseException 37151->37330 37158 6c80431b 37152->37158 37153 6c802670 RaiseException 37153->37158 37155 6c803cf0 CharUpperW RaiseException 37155->37158 37156 6c802d80 99 API calls 37156->37158 37158->37153 37158->37155 37158->37156 37159 6c804579 37158->37159 37161 6c804583 37158->37161 37162 6c80474d 37158->37162 37180 6c804936 CharUpperW 37158->37180 37197 6c8046c7 37158->37197 37421 6c8026e0 37158->37421 37425 6c802940 37158->37425 37465 6c802670 RaiseException __CxxThrowException@8 37159->37465 37163 6c8045c8 37161->37163 37466 6c802d80 99 API calls 37161->37466 37488 6c803750 75 API calls 37162->37488 37166 6c8045f1 37163->37166 37467 6c802d80 99 API calls 37163->37467 37170 6c80460d 37166->37170 37468 6c81e950 37166->37468 37167 6c80475f 37489 6c8039a0 68 API calls 37167->37489 37435 6c803250 37170->37435 37174 6c81ed50 70 API calls 37176 6c804a74 37174->37176 37198 6c825f2a 37176->37198 37178 6c804623 37185 6c804d10 68 API calls 37178->37185 37179 6c80466f 37443 6c803e70 37179->37443 37180->37158 37182 6c80487b 37186 6c803250 75 API calls 37182->37186 37183 6c804814 37183->37182 37188 6c80485a 37183->37188 37491 6c82663b RaiseException 37183->37491 37189 6c80464e 37185->37189 37186->37197 37187 6c80476c 37187->37183 37490 6c804b20 __VEC_memcpy _memmove_s 37187->37490 37188->37182 37492 6c82663b RaiseException 37188->37492 37193 6c804d10 68 API calls 37189->37193 37194 6c80465b 37193->37194 37194->37197 37486 6c8039a0 68 API calls 37194->37486 37195 6c80469b 37195->37197 37487 6c82663b RaiseException 37195->37487 37197->37174 37199 6c825fdd 37198->37199 37209 6c825f3c 37198->37209 37755 6c829494 6 API calls __decode_pointer 37199->37755 37201 6c825fe3 37756 6c827f70 67 API calls __getptd_noexit 37201->37756 37206 6c825f99 RtlAllocateHeap 37206->37209 37207 6c825f4d 37207->37209 37748 6c826fbb 67 API calls 2 library calls 37207->37748 37749 6c826e10 67 API calls 7 library calls 37207->37749 37750 6c827814 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 37207->37750 37209->37206 37209->37207 37210 6c825fc9 37209->37210 37213 6c825fce 37209->37213 37215 6c8183b6 37209->37215 37751 6c825edb 67 API calls 4 library calls 37209->37751 37752 6c829494 6 API calls __decode_pointer 37209->37752 37753 6c827f70 67 API calls __getptd_noexit 37210->37753 37754 6c827f70 67 API calls __getptd_noexit 37213->37754 37215->37032 37331 6c82663b RaiseException 37215->37331 37231 6c816d1e 37216->37231 37217 6c816fe8 37218 6c817001 37217->37218 37219 6c816ff5 37217->37219 37776 6c815c80 16 API calls 37218->37776 37757 6c8169e0 37219->37757 37222 6c81700b 37225 6c8169e0 79 API calls 37222->37225 37223 6c8251c7 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 37224 6c817139 37223->37224 37224->37040 37332 6c82663b RaiseException 37224->37332 37227 6c81703f 37225->37227 37234 6c816ffc 37227->37234 37777 6c816b40 86 API calls 37227->37777 37228 6c8255f0 __VEC_memcpy _memmove_s 37228->37231 37231->37217 37231->37228 37774 6c816280 68 API calls 37231->37774 37775 6c817860 68 API calls 2 library calls 37231->37775 37232 6c817094 37232->37234 37778 6c816b40 86 API calls 37232->37778 37234->37223 37238 6c817329 37235->37238 37237 6c8173fa 37237->37039 37238->37237 37239 6c810880 RaiseException 37238->37239 37804 6c8107d0 CharUpperW CharUpperW 37238->37804 37239->37238 37241 6c825f2a _malloc 67 API calls 37240->37241 37242 6c8109ed 37241->37242 37243 6c810a07 37242->37243 37805 6c82663b RaiseException 37242->37805 37243->37072 37246 6c81088d 37245->37246 37252 6c8108fc _memcpy_s 37245->37252 37247 6c8108aa 37246->37247 37806 6c82663b RaiseException 37246->37806 37249 6c8108d2 37247->37249 37807 6c82663b RaiseException 37247->37807 37249->37252 37808 6c82663b RaiseException 37249->37808 37252->37074 37261 6c808b3d 37253->37261 37254 6c808ca8 37255 6c825f2a _malloc 67 API calls 37254->37255 37256 6c808cb5 37255->37256 37257 6c808cfd 37256->37257 37868 6c82663b RaiseException 37256->37868 37809 6c808400 37257->37809 37259 6c812470 9 API calls 37259->37261 37261->37254 37261->37259 37262 6c808ccf 37261->37262 37263 6c808bf8 FindClose 37261->37263 37265 6c808ce6 37261->37265 37266 6c810880 RaiseException 37261->37266 37869 6c82663b RaiseException 37262->37869 37263->37261 37870 6c82663b RaiseException 37265->37870 37266->37261 37268 6c812470 9 API calls 37281 6c808d0f 37268->37281 37269 6c808e9f FindClose 37269->37281 37270 6c809969 37877 6c82663b RaiseException 37270->37877 37272 6c809980 37274 6c808d9f 37274->37089 37276 6c817240 CharUpperW CharUpperW 37276->37281 37277 6c80966c 37873 6c8082a0 37277->37873 37279 6c80970e 37280 6c8082a0 97 API calls 37279->37280 37280->37274 37281->37268 37281->37269 37281->37270 37281->37274 37281->37276 37281->37277 37281->37279 37283 6c8097ad 37281->37283 37287 6c809813 37281->37287 37288 6c8098be 37281->37288 37290 6c809d00 RaiseException 37281->37290 37291 6c8082a0 97 API calls 37281->37291 37815 6c809f10 37281->37815 37820 6c80cae0 37281->37820 37839 6c808670 37281->37839 37871 6c8107d0 CharUpperW CharUpperW 37281->37871 37872 6c8255f0 __VEC_memcpy 37281->37872 37285 6c8082a0 97 API calls 37283->37285 37285->37274 37289 6c8082a0 97 API calls 37287->37289 37292 6c8082a0 97 API calls 37288->37292 37289->37274 37290->37281 37291->37281 37292->37274 37294 6c8152a9 37293->37294 37328 6c814c52 37293->37328 37294->37050 37295 6c812470 9 API calls 37295->37328 37296 6c814cdf FindClose 37296->37328 37297 6c80cae0 169 API calls 37297->37328 37298 6c815327 37306 6c8082a0 97 API calls 37298->37306 37299 6c815315 39058 6c82663b RaiseException 37299->39058 37301 6c8152c1 37301->37298 37301->37299 37302 6c8152eb 37301->37302 39055 6c82663b RaiseException 37301->39055 37304 6c815303 37302->37304 39056 6c82663b RaiseException 37302->39056 39057 6c82663b RaiseException 37304->39057 37309 6c815349 37306->37309 37309->37050 37310 6c815364 37311 6c8082a0 97 API calls 37310->37311 37312 6c815386 37311->37312 37312->37050 37313 6c8082a0 97 API calls 37313->37328 37314 6c80abe0 VariantClear 37314->37328 37315 6c80ab10 VariantClear 37315->37328 37316 6c81539e 37317 6c8082a0 97 API calls 37316->37317 37319 6c8153cd 37317->37319 37319->37050 37320 6c8153e5 37321 6c8082a0 97 API calls 37320->37321 37323 6c815414 37321->37323 37322 6c814a10 VariantClear RaiseException 37322->37328 37323->37050 37325 6c814b60 VariantClear 37325->37328 37328->37294 37328->37295 37328->37296 37328->37297 37328->37301 37328->37310 37328->37313 37328->37314 37328->37315 37328->37316 37328->37320 37328->37322 37328->37325 39039 6c815440 37328->39039 39051 6c81e6e0 72 API calls 37328->39051 39052 6c814ac0 VariantClear 37328->39052 39053 6c826308 67 API calls 4 library calls 37328->39053 39054 6c815560 68 API calls 37328->39054 37329->37017 37330->37025 37331->37032 37332->37040 37333->37036 37334->37062 37335->37065 37336->37077 37337->37080 37338->37082 37339->37101 37340->37104 37341->37100 37342->37096 37343->37111 37344->37116 37345->37118 37346->37046 37347->37042 37348->37074 37349->37090 37350->37084 37351->37083 37352->37109 37353->37071 37354->37113 37355->37115 37356->37044 37357->37051 37358->37047 37359->37054 37360->37048 37361->37055 37362->37061 37363->37066 37364->37069 37366 6c808209 37365->37366 37367 6c808194 37365->37367 37366->37122 37367->37366 37380 6c8255f0 __VEC_memcpy 37367->37380 37370 6c8102d0 37369->37370 37372 6c81032a 37370->37372 37381 6c8255f0 __VEC_memcpy 37370->37381 37372->37125 37374 6c825f2a _malloc 67 API calls 37373->37374 37375 6c804d3f 37374->37375 37377 6c804d59 37375->37377 37382 6c82663b RaiseException 37375->37382 37378 6c804d9f 37377->37378 37379 6c810880 RaiseException 37377->37379 37378->37125 37379->37378 37380->37366 37381->37372 37382->37377 37383->37131 37384->37130 37386 6c817c7f 37385->37386 37389 6c821230 37386->37389 37390 6c825f2a _malloc 67 API calls 37389->37390 37391 6c82125d 37390->37391 37392 6c817d20 37391->37392 37394 6c82663b RaiseException 37391->37394 37392->37136 37394->37392 37396 6c80fc9a 37395->37396 37399 6c80fd05 37395->37399 37398 6c804d10 68 API calls 37396->37398 37396->37399 37415 6c80fd20 70 API calls __CxxThrowException@8 37396->37415 37398->37396 37399->37139 37401 6c82540d 37400->37401 37405 6c803c27 37400->37405 37416 6c827f70 67 API calls __getptd_noexit 37401->37416 37403 6c825412 37417 6c825bb2 6 API calls 2 library calls 37403->37417 37406 6c82539a 37405->37406 37407 6c8253b6 37406->37407 37408 6c8253a7 37406->37408 37414 6c8253da 37407->37414 37419 6c827f70 67 API calls __getptd_noexit 37407->37419 37418 6c827f70 67 API calls __getptd_noexit 37408->37418 37411 6c8253ac 37411->37143 37412 6c8253ca 37420 6c825bb2 6 API calls 2 library calls 37412->37420 37414->37143 37415->37396 37416->37403 37418->37411 37419->37412 37422 6c802720 37421->37422 37422->37422 37423 6c802745 CharUpperW 37422->37423 37424 6c80276e 37423->37424 37424->37158 37427 6c802974 37425->37427 37429 6c8029cd 37425->37429 37426 6c802ab6 37504 6c82663b RaiseException 37426->37504 37427->37429 37432 6c81e950 70 API calls 37427->37432 37429->37158 37429->37426 37433 6c81e950 70 API calls 37429->37433 37434 6c802aa4 37429->37434 37493 6c802830 37429->37493 37430 6c802acb 37432->37429 37433->37429 37434->37158 37436 6c803258 37435->37436 37437 6c803279 37435->37437 37436->37437 37593 6c803070 37436->37593 37439 6c81ed50 37437->37439 37440 6c81ed5a 37439->37440 37441 6c80461d 37440->37441 37615 6c81e7f0 70 API calls 37440->37615 37441->37178 37441->37179 37616 6c814320 37443->37616 37445 6c8041a5 37643 6c82663b RaiseException 37445->37643 37446 6c803f6f 37446->37445 37454 6c803f83 37446->37454 37448 6c8041ba 37449 6c80401c 37461 6c804047 37449->37461 37630 6c82663b RaiseException 37449->37630 37451 6c8040cf 37642 6c80d620 CharUpperW CharUpperW RaiseException 37451->37642 37452 6c804d10 68 API calls 37452->37454 37454->37449 37454->37452 37455 6c8040f6 37457 6c810880 RaiseException 37455->37457 37458 6c804104 37457->37458 37460 6c810880 RaiseException 37458->37460 37459 6c804d10 68 API calls 37459->37461 37462 6c80410f 37460->37462 37461->37451 37461->37459 37631 6c811df0 37461->37631 37463 6c804d10 68 API calls 37462->37463 37464 6c80414c 37462->37464 37463->37462 37464->37194 37465->37161 37466->37163 37467->37166 37469 6c81e9b4 37468->37469 37470 6c81e99f 37468->37470 37703 6c81df80 37469->37703 37729 6c82663b RaiseException 37470->37729 37473 6c81eb9f 37709 6c81e8c0 37473->37709 37475 6c81ebab 37484 6c81ebeb 37475->37484 37730 6c81ef50 68 API calls 2 library calls 37475->37730 37476 6c810880 RaiseException 37477 6c81ec73 37476->37477 37480 6c81ec94 37477->37480 37482 6c804d10 68 API calls 37477->37482 37478 6c804dd0 67 API calls 37483 6c81e9bd 37478->37483 37713 6c81e400 37480->37713 37482->37477 37483->37473 37483->37478 37484->37476 37485 6c81ecc1 37485->37170 37486->37195 37487->37197 37488->37167 37489->37187 37490->37183 37491->37188 37492->37182 37505 6c812610 37493->37505 37495 6c80287c 37496 6c802898 37495->37496 37546 6c82663b RaiseException 37495->37546 37509 6c810450 37496->37509 37499 6c8028a6 37502 6c8028c2 37499->37502 37547 6c82663b RaiseException 37499->37547 37501 6c802917 37501->37429 37502->37501 37503 6c81e950 70 API calls 37502->37503 37503->37502 37504->37430 37506 6c81264d 37505->37506 37548 6c8125a0 37506->37548 37508 6c81265e 37508->37495 37577 6c812a70 37509->37577 37511 6c81049b 37512 6c810514 37511->37512 37513 6c81049f GetFileSize 37511->37513 37514 6c810523 37512->37514 37515 6c81051c CloseHandle 37512->37515 37516 6c8104b4 GetLastError 37513->37516 37520 6c8104be 37513->37520 37514->37499 37515->37514 37517 6c810537 37516->37517 37516->37520 37518 6c810543 37517->37518 37519 6c81053c CloseHandle 37517->37519 37518->37499 37519->37518 37520->37517 37521 6c8104e1 37520->37521 37587 6c812bd0 ReadFile 37521->37587 37523 6c810504 37524 6c810557 37523->37524 37525 6c810508 37523->37525 37526 6c81056b CloseHandle 37524->37526 37527 6c810576 37524->37527 37525->37512 37526->37527 37528 6c8105e1 37527->37528 37529 6c8105a5 37527->37529 37589 6c810a20 MultiByteToWideChar RaiseException __CxxThrowException@8 37528->37589 37531 6c8105eb 37529->37531 37533 6c8105b0 37529->37533 37540 6c81062e 37531->37540 37590 6c804b20 __VEC_memcpy _memmove_s 37531->37590 37588 6c8019a0 CloseHandle 37533->37588 37534 6c810693 37592 6c810270 __VEC_memcpy 37534->37592 37537 6c8105cd 37537->37499 37539 6c81069b 37541 6c804d10 68 API calls 37539->37541 37543 6c8106b1 37539->37543 37540->37534 37542 6c804d10 68 API calls 37540->37542 37591 6c810270 __VEC_memcpy 37540->37591 37541->37543 37542->37540 37544 6c8106d7 CloseHandle 37543->37544 37545 6c8106de 37543->37545 37544->37545 37545->37499 37546->37496 37547->37502 37553 6c812470 37548->37553 37551 6c8125f0 37551->37508 37552 6c8125e9 FindClose 37552->37551 37554 6c8124c3 FindClose 37553->37554 37555 6c8124d8 FindFirstFileW 37553->37555 37556 6c8124d2 37554->37556 37558 6c812542 37554->37558 37557 6c8124eb 37555->37557 37555->37558 37556->37555 37564 6c8128a0 37557->37564 37568 6c8251c7 37558->37568 37560 6c812589 37560->37551 37560->37552 37562 6c81251d 37562->37558 37563 6c812534 FindFirstFileW 37562->37563 37563->37558 37566 6c8128e4 37564->37566 37565 6c81298b GetCurrentDirectoryW 37567 6c8129a4 37565->37567 37566->37565 37566->37567 37567->37562 37569 6c8251d1 IsDebuggerPresent 37568->37569 37570 6c8251cf 37568->37570 37576 6c8284c5 37569->37576 37570->37560 37573 6c826ba3 SetUnhandledExceptionFilter UnhandledExceptionFilter 37574 6c826bc0 __invoke_watson 37573->37574 37575 6c826bc8 GetCurrentProcess TerminateProcess 37573->37575 37574->37575 37575->37560 37576->37573 37578 6c812ab3 CreateFileW 37577->37578 37579 6c812a9e CloseHandle 37577->37579 37582 6c812ad9 37578->37582 37586 6c812b33 37578->37586 37580 6c812b57 37579->37580 37581 6c812aad 37579->37581 37580->37511 37581->37578 37583 6c8128a0 GetCurrentDirectoryW 37582->37583 37584 6c812b00 37583->37584 37585 6c812b15 CreateFileW 37584->37585 37584->37586 37585->37586 37586->37511 37587->37523 37588->37537 37589->37531 37590->37540 37591->37540 37592->37539 37606 6c803030 37593->37606 37596 6c803030 10 API calls 37597 6c8030b3 37596->37597 37602 6c8030d9 37597->37602 37610 6c802f70 37597->37610 37599 6c803235 37599->37436 37601 6c8031ce 37601->37599 37603 6c803070 75 API calls 37601->37603 37602->37601 37604 6c805a70 68 API calls 37602->37604 37605 6c810880 RaiseException 37602->37605 37614 6c8107d0 CharUpperW CharUpperW 37602->37614 37603->37601 37604->37602 37605->37602 37607 6c80306a 37606->37607 37608 6c80303b 37606->37608 37607->37596 37608->37607 37609 6c802f70 10 API calls 37608->37609 37609->37608 37611 6c802fa2 37610->37611 37613 6c802fef 37610->37613 37612 6c8125a0 10 API calls 37611->37612 37611->37613 37612->37613 37613->37597 37614->37602 37615->37440 37617 6c8143cb 37616->37617 37624 6c81437a 37616->37624 37618 6c810880 RaiseException 37617->37618 37620 6c8143d5 37618->37620 37622 6c810880 RaiseException 37620->37622 37623 6c8143e0 37622->37623 37626 6c810880 RaiseException 37623->37626 37624->37617 37625 6c81441d 37624->37625 37644 6c8135f0 37624->37644 37687 6c813460 68 API calls 37624->37687 37625->37446 37627 6c8143eb 37626->37627 37628 6c810880 RaiseException 37627->37628 37629 6c8143f6 37628->37629 37629->37446 37630->37461 37632 6c811e25 GetFullPathNameW 37631->37632 37633 6c811e14 37631->37633 37634 6c811e46 37632->37634 37633->37632 37635 6c811e5f 37634->37635 37638 6c811e87 GetFullPathNameW 37634->37638 37639 6c811ea5 37634->37639 37635->37461 37636 6c811edd 37702 6c811cc0 CharUpperW CharUpperW 37636->37702 37637 6c811ecc lstrlenW 37637->37636 37638->37639 37639->37635 37639->37636 37639->37637 37641 6c811ef0 37641->37461 37642->37455 37643->37448 37646 6c813628 37644->37646 37645 6c814303 37645->37624 37646->37645 37665 6c8136e8 37646->37665 37672 6c813e62 37646->37672 37647 6c813db4 37647->37624 37649 6c812470 9 API calls 37649->37665 37650 6c814213 GetLastError 37653 6c814225 GetLastError 37650->37653 37659 6c81426f 37650->37659 37651 6c812470 9 API calls 37664 6c813a79 37651->37664 37652 6c8137c3 FindClose 37652->37665 37655 6c814234 37653->37655 37656 6c814257 37653->37656 37654 6c8137d1 GetLastError 37654->37665 37662 6c810880 RaiseException 37655->37662 37658 6c804d10 68 API calls 37656->37658 37657 6c813b47 FindClose 37657->37664 37658->37659 37668 6c8142a5 FindClose 37659->37668 37669 6c8142ac 37659->37669 37660 6c804d10 68 API calls 37660->37665 37661 6c813c19 GetLastError 37661->37664 37662->37656 37664->37647 37664->37651 37664->37657 37664->37661 37666 6c804d10 68 API calls 37664->37666 37670 6c810880 RaiseException 37664->37670 37692 6c8134f0 85 API calls 37664->37692 37665->37649 37665->37652 37665->37654 37665->37660 37665->37664 37681 6c810880 RaiseException 37665->37681 37686 6c813ba9 37665->37686 37688 6c81e790 70 API calls 37665->37688 37689 6c8131d0 68 API calls 37665->37689 37690 6c81e370 CharUpperW CharUpperW 37665->37690 37691 6c8134f0 85 API calls 37665->37691 37666->37664 37668->37669 37669->37624 37670->37664 37671 6c8142c4 37673 6c814301 37671->37673 37674 6c8142fa FindClose 37671->37674 37672->37650 37672->37671 37675 6c810880 RaiseException 37672->37675 37679 6c81e790 70 API calls 37672->37679 37684 6c804d10 68 API calls 37672->37684 37693 6c812790 10 API calls __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 37672->37693 37694 6c8131d0 68 API calls 37672->37694 37695 6c81e370 CharUpperW CharUpperW 37672->37695 37696 6c805bb0 37672->37696 37701 6c8134f0 85 API calls 37672->37701 37673->37645 37674->37673 37675->37672 37679->37672 37681->37665 37684->37672 37686->37624 37687->37624 37688->37665 37689->37665 37690->37665 37691->37665 37692->37664 37693->37672 37694->37672 37695->37672 37697 6c810880 RaiseException 37696->37697 37698 6c805bc8 37697->37698 37699 6c805be6 37698->37699 37700 6c804d10 68 API calls 37698->37700 37699->37672 37700->37698 37701->37672 37702->37641 37704 6c81dfb7 37703->37704 37705 6c81e021 37704->37705 37706 6c81dfda 37704->37706 37708 6c804d10 68 API calls 37704->37708 37707 6c804d10 68 API calls 37705->37707 37706->37483 37707->37706 37708->37704 37711 6c81e8cf 37709->37711 37712 6c81e93b 37709->37712 37711->37712 37731 6c8107d0 CharUpperW CharUpperW 37711->37731 37712->37475 37714 6c81e475 37713->37714 37715 6c81e435 37713->37715 37714->37715 37722 6c81e48d 37714->37722 37716 6c81e459 37715->37716 37717 6c81e43d 37715->37717 37719 6c805a70 68 API calls 37716->37719 37732 6c805a70 37717->37732 37721 6c81e461 37719->37721 37721->37485 37741 6c81e370 CharUpperW CharUpperW 37722->37741 37724 6c81e493 37727 6c81e4b7 37724->37727 37742 6c81ee90 68 API calls 2 library calls 37724->37742 37726 6c81e400 70 API calls 37728 6c81e4e8 37726->37728 37727->37726 37728->37485 37729->37469 37730->37484 37731->37711 37733 6c825f2a _malloc 67 API calls 37732->37733 37734 6c805aa3 37733->37734 37735 6c805abf 37734->37735 37747 6c82663b RaiseException 37734->37747 37743 6c805b40 37735->37743 37738 6c805b10 37738->37485 37740 6c810880 RaiseException 37740->37738 37741->37724 37742->37727 37744 6c805b8b 37743->37744 37745 6c805bb0 68 API calls 37744->37745 37746 6c805acc 37745->37746 37746->37738 37746->37740 37747->37735 37748->37207 37749->37207 37751->37209 37752->37209 37753->37213 37754->37215 37755->37201 37756->37215 37758 6c816a0f LoadLibraryExW 37757->37758 37759 6c816a3e 37757->37759 37760 6c816a22 37758->37760 37761 6c816a37 FreeLibrary 37758->37761 37779 6c817750 37759->37779 37760->37234 37761->37759 37764 6c816a83 FreeLibrary 37765 6c816a97 GetProcAddress 37764->37765 37766 6c816a8e 37764->37766 37767 6c816ab5 37765->37767 37768 6c816ae9 37765->37768 37766->37765 37786 6c815f50 GetProcAddress 37767->37786 37768->37234 37771 6c816acc 37794 6c816530 73 API calls 2 library calls 37771->37794 37773 6c816ad8 37773->37768 37774->37231 37775->37231 37776->37222 37777->37232 37778->37234 37780 6c825f2a _malloc 67 API calls 37779->37780 37781 6c817762 37780->37781 37784 6c81777e 37781->37784 37795 6c82663b RaiseException 37781->37795 37783 6c816a54 37783->37764 37783->37765 37783->37768 37784->37783 37785 6c810880 RaiseException 37784->37785 37785->37783 37787 6c815f90 GetProcAddress 37786->37787 37788 6c81601a 37786->37788 37792 6c815fa5 37787->37792 37789 6c8251c7 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 37788->37789 37790 6c816029 37789->37790 37790->37768 37790->37771 37791 6c815e80 VariantClear 37791->37792 37792->37788 37792->37791 37796 6c8177e0 37792->37796 37794->37773 37795->37784 37797 6c825f2a _malloc 67 API calls 37796->37797 37798 6c8177eb 37797->37798 37800 6c817808 37798->37800 37803 6c82663b RaiseException 37798->37803 37801 6c810880 RaiseException 37800->37801 37802 6c817843 37800->37802 37801->37802 37802->37792 37803->37800 37804->37238 37805->37243 37806->37247 37807->37249 37808->37252 37810 6c808473 37809->37810 37811 6c825f2a _malloc 67 API calls 37810->37811 37812 6c8084fb 37811->37812 37814 6c808515 37812->37814 37878 6c82663b RaiseException 37812->37878 37814->37281 37816 6c810880 RaiseException 37815->37816 37818 6c809f2e 37816->37818 37817 6c809f81 37817->37281 37818->37817 37819 6c810880 RaiseException 37818->37819 37819->37818 37821 6c825f2a _malloc 67 API calls 37820->37821 37822 6c80cb1d 37821->37822 37824 6c80cb35 37822->37824 37899 6c82663b RaiseException 37822->37899 37825 6c80cc8c 37824->37825 37826 6c811df0 5 API calls 37824->37826 37885 6c80c430 37825->37885 37827 6c80cbcc 37826->37827 37829 6c80cbd3 GetLastError 37827->37829 37835 6c80cc24 37827->37835 37833 6c80cbe4 37829->37833 37830 6c80ccbc 37831 6c804d10 68 API calls 37830->37831 37832 6c80ccc2 37830->37832 37836 6c80cd2e 37831->37836 37832->37281 37833->37281 37834 6c804d10 68 API calls 37834->37836 37879 6c80a910 37835->37879 37836->37834 37838 6c80cd7e 37836->37838 37838->37281 37840 6c8087cd 37839->37840 37845 6c8086cf 37839->37845 37848 6c8087d9 37840->37848 38328 6c80a5c0 37840->38328 37842 6c8088d1 38333 6c8099d0 37842->38333 37843 6c80abe0 VariantClear 37843->37845 37845->37840 37845->37843 37846 6c8086e1 37845->37846 38450 6c80ab10 37845->38450 38462 6c81e6e0 72 API calls 37845->38462 38463 6c809d00 RaiseException 37845->38463 37846->37281 37848->37281 37850 6c808931 38352 6c805e10 37850->38352 37851 6c8088e5 37851->37850 38339 6c811420 37851->38339 37854 6c808967 38356 6c80d1b0 37854->38356 37855 6c80890f 37855->37850 37858 6c808916 GetLastError 37855->37858 38464 6c82663b RaiseException 37858->38464 37860 6c808974 37860->37846 37861 6c808a3c 37860->37861 37863 6c8089e1 37860->37863 38366 100061aa 37861->38366 38404 10005aa5 37861->38404 37862 6c808a26 37864 6c812e40 VariantClear 37862->37864 37863->37862 38465 6c812f70 RaiseException __CxxThrowException@8 37863->38465 37864->37846 37868->37262 37869->37265 37870->37257 37871->37281 37872->37281 37874 6c8082d4 37873->37874 37875 6c8082e8 37873->37875 37874->37875 38965 10006b2c 37874->38965 37875->37274 37877->37272 37878->37814 37880 6c80a943 37879->37880 37881 6c8125a0 10 API calls 37880->37881 37882 6c80a966 37881->37882 37883 6c80a997 37882->37883 37900 6c82663b RaiseException 37882->37900 37883->37825 37897 6c80c46b 37885->37897 37886 6c80c88a 37889 6c812e40 VariantClear 37886->37889 37888 6c80caa1 37890 6c812e40 VariantClear 37888->37890 37891 6c80c893 37889->37891 37898 6c80c860 37890->37898 37891->37830 37892 6c80ce60 68 API calls 37892->37897 37897->37830 37897->37886 37897->37888 37897->37892 37897->37898 37901 6c80c2d0 37897->37901 37917 6c812e40 37897->37917 37921 6c80abe0 37897->37921 37943 6c80ae70 37897->37943 37988 6c80ad90 VariantClear 37897->37988 37898->37830 37899->37824 37900->37883 37902 6c80c351 37901->37902 37903 6c80c311 37901->37903 37904 6c825f2a _malloc 67 API calls 37902->37904 37905 6c825f2a _malloc 67 API calls 37903->37905 37906 6c80c358 37904->37906 37907 6c80c318 37905->37907 37908 6c80c374 37906->37908 37990 6c82663b RaiseException 37906->37990 37914 6c80c334 37907->37914 37989 6c82663b RaiseException 37907->37989 37911 6c812a70 4 API calls 37908->37911 37913 6c80c3b8 37911->37913 37912 6c80ae70 164 API calls 37916 6c80c3d3 37912->37916 37913->37914 37915 6c80c3bc GetLastError 37913->37915 37914->37912 37915->37916 37916->37897 37918 6c812e65 VariantClear 37917->37918 37919 6c812e4b 37917->37919 37918->37897 37919->37918 37920 6c812e59 37919->37920 37920->37897 37922 6c80ac34 37921->37922 37923 6c80ac3a 37922->37923 37928 6c80ac59 37922->37928 37924 6c812e40 VariantClear 37923->37924 37925 6c80ac43 37924->37925 37925->37897 37926 6c80ad61 37927 6c812e40 VariantClear 37926->37927 37929 6c80ad6a 37927->37929 37928->37926 37930 6c812e40 VariantClear 37928->37930 37929->37897 37932 6c80ac9a 37930->37932 37931 6c80ad4b 37931->37897 37932->37931 37933 6c80acfe 37932->37933 37934 6c80acdf 37932->37934 37936 6c80ad3d 37933->37936 37940 6c80ad09 37933->37940 37935 6c812e40 VariantClear 37934->37935 37937 6c80ace8 37935->37937 37936->37926 37938 6c80ad42 37936->37938 37937->37897 37939 6c812e40 VariantClear 37938->37939 37939->37931 37941 6c812e40 VariantClear 37940->37941 37942 6c80ad27 37941->37942 37942->37897 37946 6c80aecd 37943->37946 37944 6c80afba 37945 6c810880 RaiseException 37944->37945 37959 6c80afca 37945->37959 37946->37944 37947 6c80afe4 37946->37947 37948 6c80b0e3 37947->37948 37952 6c810880 RaiseException 37947->37952 38027 6c8107d0 CharUpperW CharUpperW 37947->38027 38028 6c810930 __VEC_memcpy RaiseException _memmove_s 37947->38028 37954 6c80b1a8 37948->37954 37962 6c80b734 37948->37962 37984 6c80b0fa 37948->37984 38029 6c8107d0 CharUpperW CharUpperW 37948->38029 37951 6c80b19d 37951->37954 37951->37962 37952->37947 37954->37984 38030 6c80ce00 __VEC_memcpy _memmove_s 37954->38030 37955 6c8251c7 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 37956 6c80bd53 37955->37956 37956->37897 37967 6c80be65 37959->37967 37959->37984 37985 6c801ab0 3 API calls 37959->37985 37991 100089ec 37959->37991 37997 1000790d 37959->37997 37960 6c80b6c4 37965 6c809f10 RaiseException 37960->37965 37961 6c80b9e7 37961->37959 38035 6c8107d0 CharUpperW CharUpperW 37961->38035 37968 6c80b915 37962->37968 37972 6c80b6ea 37962->37972 37962->37984 38031 6c8107d0 CharUpperW CharUpperW 37962->38031 37965->37972 37966 6c80bee7 VariantClear 37977 6c80bef4 37966->37977 37967->37966 37967->37977 37967->37984 38032 6c810990 __VEC_memcpy _memmove_s 37968->38032 37969 6c80b639 37969->37960 37971 6c810880 RaiseException 37969->37971 37971->37969 37972->37959 37972->37961 38034 6c8107d0 CharUpperW CharUpperW 37972->38034 37973 6c80b923 38033 6c810930 __VEC_memcpy RaiseException _memmove_s 37973->38033 37974 6c80b3c7 _memset 37974->37969 37976 6c810880 RaiseException 37974->37976 37974->37984 37976->37974 37981 6c80c0f3 37977->37981 37982 6c80bf38 37977->37982 37978 6c80c122 38038 6c8080f0 CharUpperW CharUpperW __VEC_memcpy 37978->38038 37981->37978 38037 6c8107d0 CharUpperW CharUpperW 37981->38037 38036 6c8080f0 CharUpperW CharUpperW __VEC_memcpy 37982->38036 37984->37955 37984->37984 37985->37959 37988->37897 37989->37914 37990->37908 37992 100089fd 37991->37992 37996 6c801ab0 3 API calls 37992->37996 37993 10008a11 37994 10008a21 37993->37994 38039 100087ae 37993->38039 37994->37959 37996->37993 37998 10007917 __EH_prolog 37997->37998 37999 100015ec ctype 29 API calls 37998->37999 38000 10007939 37999->38000 38001 100089ec 35 API calls 38000->38001 38002 1000798e 38001->38002 38003 10007995 38002->38003 38004 100079c8 38002->38004 38079 10007ad6 29 API calls 2 library calls 38003->38079 38069 100012b5 38004->38069 38010 10007a40 38081 10009f5e 30 API calls ctype 38010->38081 38011 10007a02 38013 1000109b ctype 29 API calls 38011->38013 38015 10007a0a 38013->38015 38014 10007a47 38082 10009fa0 30 API calls ctype 38014->38082 38080 10007ad6 29 API calls 2 library calls 38015->38080 38018 10007a4e 38083 10009ff5 30 API calls ctype 38018->38083 38019 100079a1 38019->37959 38021 10007a55 38022 1000109b ctype 29 API calls 38021->38022 38023 10007a68 38022->38023 38084 10007ad6 29 API calls 2 library calls 38023->38084 38025 10007a75 38085 1000a8eb 30 API calls 2 library calls 38025->38085 38027->37947 38028->37947 38029->37951 38030->37974 38031->37962 38032->37973 38033->37972 38034->37972 38035->37961 38036->37984 38037->37981 38038->37984 38040 100087b8 __EH_prolog 38039->38040 38047 10002f32 38040->38047 38042 100087e4 38042->37994 38043 100087d1 38043->38042 38050 10002e98 38043->38050 38045 1000109b ctype 29 API calls 38045->38042 38046 1000880a ctype 38046->38045 38056 10002ee6 38047->38056 38051 10002ed9 38050->38051 38052 10002ea5 38050->38052 38051->38046 38055 10002eb0 ctype 38052->38055 38060 10001075 38052->38060 38054 1000109b ctype 29 API calls 38054->38051 38055->38054 38057 10002efa 38056->38057 38058 10002f29 38057->38058 38059 6c8019c0 2 API calls 38057->38059 38058->38043 38059->38057 38065 1001887a 38060->38065 38063 10001099 38063->38055 38066 1001888c ctype 29 API calls 38065->38066 38067 10001080 38066->38067 38067->38063 38068 100189b4 RaiseException 38067->38068 38068->38063 38070 100012f5 38069->38070 38071 100012c5 38069->38071 38075 1000a496 38070->38075 38072 10001075 30 API calls 38071->38072 38073 100012cf 38072->38073 38073->38070 38074 1000109b ctype 29 API calls 38073->38074 38074->38070 38076 1000a4a0 __EH_prolog 38075->38076 38086 1000a0ce 38076->38086 38079->38019 38080->38019 38081->38014 38082->38018 38083->38021 38084->38025 38085->38019 38087 1000a0d8 __EH_prolog 38086->38087 38129 10007b7e 38087->38129 38091 1000a11d 38092 1000a27a 38091->38092 38099 1000a170 38091->38099 38094 1000a1ee 38092->38094 38237 1000856a RaiseException 38092->38237 38104 100079fc 38094->38104 38128 6c801ab0 3 API calls 38094->38128 38095 1000a2da 38096 10002e98 30 API calls 38095->38096 38095->38104 38097 1000a2ff 38096->38097 38098 10002f32 2 API calls 38097->38098 38100 1000a30c 38098->38100 38102 10002f32 2 API calls 38099->38102 38099->38104 38101 1000a310 38100->38101 38105 1000a35b 38100->38105 38238 1000856a RaiseException 38100->38238 38103 1000109b ctype 29 API calls 38101->38103 38102->38094 38103->38104 38104->38010 38104->38011 38142 10008505 38105->38142 38110 1000a396 38111 1000a42a 38110->38111 38112 1000a3b1 38110->38112 38239 1000856a RaiseException 38110->38239 38151 10009824 38111->38151 38240 1000948e 158 API calls 2 library calls 38112->38240 38116 1000a3d9 38117 100015ec ctype 29 API calls 38116->38117 38120 1000a45b 38117->38120 38118 1000a3d5 38118->38116 38119 1000a3fe 38118->38119 38241 1000856a RaiseException 38118->38241 38123 10008505 30 API calls 38119->38123 38122 100015a7 ctype 29 API calls 38120->38122 38122->38101 38124 1000a414 38123->38124 38125 10008617 RaiseException 38124->38125 38126 1000a41c 38125->38126 38126->38111 38242 1000856a RaiseException 38126->38242 38128->38095 38243 10007bd9 38129->38243 38132 100015ec ctype 29 API calls 38133 10007b91 38132->38133 38134 100015ec ctype 29 API calls 38133->38134 38135 10007b9c 38134->38135 38136 100015ec ctype 29 API calls 38135->38136 38137 10007ba7 38136->38137 38138 100015ec ctype 29 API calls 38137->38138 38139 10007bb2 38138->38139 38140 100015ec ctype 29 API calls 38139->38140 38141 10007bbd 38140->38141 38141->38091 38236 1000856a RaiseException 38141->38236 38274 10008491 38142->38274 38145 10008617 38146 1000862a 38145->38146 38148 1000862f 38145->38148 38278 1000856a RaiseException 38146->38278 38150 1000868a 38148->38150 38279 1000856a RaiseException 38148->38279 38150->38110 38152 1000982e __EH_prolog 38151->38152 38153 10008617 RaiseException 38152->38153 38154 10009841 38153->38154 38157 1000986b 38154->38157 38288 10008a48 RaiseException 38154->38288 38156 10009863 38158 10008617 RaiseException 38156->38158 38163 100098e8 38157->38163 38289 1000948e 158 API calls 2 library calls 38157->38289 38158->38157 38160 100098b6 38161 10008617 RaiseException 38160->38161 38189 100098ba 38160->38189 38161->38163 38162 100015ec ctype 29 API calls 38164 10009a49 38162->38164 38166 10009944 38163->38166 38192 1000999d 38163->38192 38165 100015a7 ctype 29 API calls 38164->38165 38167 10009a55 38165->38167 38280 100092ee 38166->38280 38167->38116 38169 100015ec ctype 29 API calls 38171 100099fe 38169->38171 38174 10009a06 38171->38174 38175 10009a5c 38171->38175 38173 10008617 RaiseException 38176 10009995 38173->38176 38177 100015a7 ctype 29 API calls 38174->38177 38180 10009a6c 38175->38180 38293 1000856a RaiseException 38175->38293 38176->38169 38178 10009a15 38177->38178 38182 100015a7 ctype 29 API calls 38178->38182 38294 100086b3 38180->38294 38185 10009a24 38182->38185 38188 100015a7 ctype 29 API calls 38185->38188 38188->38189 38189->38162 38190 100040e5 30 API calls 38190->38192 38191 10009ab7 38313 100034b0 30 API calls 38191->38313 38192->38176 38192->38190 38290 10006206 RaiseException 38192->38290 38291 100034b0 30 API calls 38192->38291 38292 10006398 30 API calls 38192->38292 38195 10009ac5 38197 10009ad8 38195->38197 38314 100034b0 30 API calls 38195->38314 38196 10009a80 38196->38191 38203 1000109b ctype 29 API calls 38196->38203 38311 10009f34 30 API calls 38196->38311 38312 1000a563 30 API calls __EH_prolog 38196->38312 38198 10009af3 38197->38198 38315 100034b0 30 API calls 38197->38315 38316 1000841c 30 API calls ctype 38198->38316 38203->38196 38204 10008617 RaiseException 38229 10009b19 38204->38229 38205 10009e7e 38206 100015a7 ctype 29 API calls 38205->38206 38209 10009e8a 38206->38209 38207 10009db8 38207->38205 38327 10006398 30 API calls 38207->38327 38210 100015a7 ctype 29 API calls 38209->38210 38212 10009e96 38210->38212 38213 100015a7 ctype 29 API calls 38212->38213 38218 10009ea2 38213->38218 38214 1000936b 30 API calls 38214->38229 38215 1000851b 30 API calls 38215->38229 38220 100015a7 ctype 29 API calls 38218->38220 38222 10009eb1 38220->38222 38224 100015a7 ctype 29 API calls 38222->38224 38227 10009ec0 38224->38227 38225 1000841c 30 API calls 38225->38229 38226 1000856a RaiseException 38226->38229 38230 100015a7 ctype 29 API calls 38227->38230 38229->38204 38229->38207 38229->38214 38229->38215 38229->38225 38229->38226 38232 100015a7 ctype 29 API calls 38229->38232 38317 1000871a 30 API calls 38229->38317 38318 100093bf 30 API calls ctype 38229->38318 38319 100086d0 RaiseException 38229->38319 38320 100034b0 30 API calls 38229->38320 38321 1000940a 30 API calls __EH_prolog 38229->38321 38322 10008582 38229->38322 38326 100085d9 RaiseException 38229->38326 38231 10009ecf 38230->38231 38233 100015ec ctype 29 API calls 38231->38233 38232->38229 38234 10009ee5 38233->38234 38235 100015a7 ctype 29 API calls 38234->38235 38235->38167 38236->38091 38237->38094 38238->38105 38239->38112 38240->38118 38241->38119 38242->38111 38244 100015ec ctype 29 API calls 38243->38244 38245 10007be2 38244->38245 38246 100015ec ctype 29 API calls 38245->38246 38247 10007bea 38246->38247 38248 100015ec ctype 29 API calls 38247->38248 38249 10007bf2 38248->38249 38250 100015ec ctype 29 API calls 38249->38250 38251 10007bfa 38250->38251 38252 100015ec ctype 29 API calls 38251->38252 38253 10007c02 38252->38253 38254 100015ec ctype 29 API calls 38253->38254 38255 10007c0a 38254->38255 38256 100015ec ctype 29 API calls 38255->38256 38257 10007c14 38256->38257 38258 100015ec ctype 29 API calls 38257->38258 38259 10007c1c 38258->38259 38260 100015ec ctype 29 API calls 38259->38260 38261 10007c29 38260->38261 38262 100015ec ctype 29 API calls 38261->38262 38263 10007c31 38262->38263 38264 100015ec ctype 29 API calls 38263->38264 38265 10007c3e 38264->38265 38266 100015ec ctype 29 API calls 38265->38266 38267 10007c46 38266->38267 38268 100015ec ctype 29 API calls 38267->38268 38269 10007c53 38268->38269 38270 100015ec ctype 29 API calls 38269->38270 38271 10007c5b 38270->38271 38272 100015ec ctype 29 API calls 38271->38272 38273 10007b86 38272->38273 38273->38132 38275 10008499 38274->38275 38276 100084b4 30 API calls 38275->38276 38277 100084ac 38276->38277 38277->38145 38278->38148 38279->38148 38284 100092f5 38280->38284 38281 10008617 RaiseException 38281->38284 38282 10009365 38282->38173 38283 10008d1a 30 API calls 38283->38284 38284->38281 38284->38282 38284->38283 38285 10008ddd 30 API calls 38284->38285 38286 1000856a RaiseException 38284->38286 38287 10009028 30 API calls 38284->38287 38285->38284 38286->38284 38287->38284 38288->38156 38289->38160 38290->38192 38291->38192 38292->38192 38293->38180 38295 10008617 RaiseException 38294->38295 38296 100086b9 38295->38296 38297 1000856a RaiseException 38296->38297 38298 100086cc 38296->38298 38297->38298 38299 1000163d 38298->38299 38300 10001651 38299->38300 38301 100016e1 38299->38301 38302 1000166e 38300->38302 38303 100189b4 RaiseException 38300->38303 38301->38196 38304 10001695 38302->38304 38305 100189b4 RaiseException 38302->38305 38303->38302 38306 10001075 30 API calls 38304->38306 38309 100016bd 38304->38309 38305->38304 38308 100016a1 38306->38308 38307 1000109b ctype 29 API calls 38307->38301 38308->38309 38310 100189b4 RaiseException 38308->38310 38309->38307 38310->38309 38311->38196 38312->38196 38313->38195 38314->38197 38315->38198 38316->38229 38317->38229 38318->38229 38319->38229 38320->38229 38321->38229 38323 10008592 38322->38323 38324 1000858d 38322->38324 38323->38229 38325 1000856a RaiseException 38324->38325 38325->38323 38326->38229 38327->38207 38466 6c80a2f0 38328->38466 38330 6c80a5fc 38471 6c80a240 38330->38471 38332 6c80a60d 38332->37842 38334 6c8099e4 38333->38334 38337 6c8099ed 38333->38337 38334->37851 38335 6c8099fe 38335->37851 38337->38335 38486 6c8255f0 __VEC_memcpy 38337->38486 38487 6c809e80 __VEC_memcpy _memmove_s 38337->38487 38341 6c811454 38339->38341 38340 6c8114ca 38488 6c811340 CreateDirectoryW 38340->38488 38341->38340 38348 6c811659 38341->38348 38497 6c8255f0 __VEC_memcpy 38341->38497 38343 6c811528 GetLastError 38345 6c811630 38343->38345 38351 6c811520 38343->38351 38346 6c8125a0 10 API calls 38345->38346 38349 6c811655 38346->38349 38347 6c811340 4 API calls 38347->38349 38348->37855 38349->38347 38349->38348 38350 6c811340 4 API calls 38350->38351 38351->38343 38351->38348 38351->38349 38351->38350 38353 6c805e5d 38352->38353 38354 6c805bb0 68 API calls 38353->38354 38355 6c805f27 38354->38355 38355->37854 38357 6c80d1ec 38356->38357 38365 6c80d487 38356->38365 38358 6c80d415 38357->38358 38360 6c804d10 68 API calls 38357->38360 38363 6c812e40 VariantClear 38357->38363 38357->38365 38498 6c80d100 SysAllocString VariantClear RaiseException 38357->38498 38499 6c812ec0 VariantClear VariantCopy __VEC_memcpy _memmove_s 38357->38499 38500 6c82663b RaiseException 38357->38500 38361 6c810880 RaiseException 38358->38361 38358->38365 38360->38357 38361->38358 38363->38357 38365->37860 38384 10005ce0 38366->38384 38367 10005d05 38370 10006305 29 API calls 38367->38370 38368 10005d3a 38501 10006305 38368->38501 38369 10001075 30 API calls 38369->38384 38371 10005c59 38370->38371 38374 100015ec ctype 29 API calls 38371->38374 38376 10005c61 38374->38376 38378 100015a7 ctype 29 API calls 38376->38378 38381 10005c6d 38378->38381 38380 10005e06 38382 10006305 29 API calls 38380->38382 38381->37846 38383 10005e37 38382->38383 38385 100015ec ctype 29 API calls 38383->38385 38384->38367 38384->38368 38384->38369 38384->38380 38389 100069d4 99 API calls 38384->38389 38390 10006040 38384->38390 38392 10005f4b 38384->38392 38395 10005fcd 38384->38395 38397 100060b5 38384->38397 38511 100066c2 38384->38511 38515 10004859 38384->38515 38657 1000657a 30 API calls __EH_prolog 38384->38657 38387 10005e4a 38385->38387 38388 100015a7 ctype 29 API calls 38387->38388 38388->38381 38389->38384 38391 10006305 29 API calls 38390->38391 38393 10005f86 38391->38393 38394 10006305 29 API calls 38392->38394 38398 100015ec ctype 29 API calls 38393->38398 38394->38393 38396 10006305 29 API calls 38395->38396 38396->38393 38399 10006305 29 API calls 38397->38399 38400 10005f99 38398->38400 38402 100060f3 38399->38402 38401 100015a7 ctype 29 API calls 38400->38401 38401->38381 38658 100063c7 29 API calls 2 library calls 38402->38658 38408 10005aaf __EH_prolog 38404->38408 38405 10005aff 38405->37846 38407 10005c39 38411 10001075 30 API calls 38407->38411 38421 10005c4e 38407->38421 38408->38405 38408->38407 38409 100063ff 30 API calls 38408->38409 38415 100015a7 29 API calls ctype 38408->38415 38959 10006293 30 API calls __EH_prolog 38408->38959 38960 10006206 RaiseException 38408->38960 38961 10006398 30 API calls 38408->38961 38409->38408 38410 100015ec ctype 29 API calls 38412 10005c61 38410->38412 38436 10005c9f 38411->38436 38414 100015a7 ctype 29 API calls 38412->38414 38414->38405 38415->38408 38417 10005d05 38420 10006305 29 API calls 38417->38420 38418 10005d3a 38422 10006305 29 API calls 38418->38422 38419 10001075 30 API calls 38419->38436 38420->38421 38421->38410 38424 10005d55 38422->38424 38962 100063c7 29 API calls 2 library calls 38424->38962 38426 100066c2 99 API calls 38426->38436 38427 10005e06 38428 10006305 29 API calls 38427->38428 38429 10005e37 38428->38429 38430 100015ec ctype 29 API calls 38429->38430 38432 10005e4a 38430->38432 38431 10004859 158 API calls 38431->38436 38433 100015a7 ctype 29 API calls 38432->38433 38433->38405 38434 100069d4 99 API calls 38434->38436 38435 10006040 38437 10006305 29 API calls 38435->38437 38436->38417 38436->38418 38436->38419 38436->38426 38436->38427 38436->38431 38436->38434 38436->38435 38438 10005f4b 38436->38438 38441 10005fcd 38436->38441 38443 100060b5 38436->38443 38963 1000657a 30 API calls __EH_prolog 38436->38963 38439 10005f86 38437->38439 38440 10006305 29 API calls 38438->38440 38444 100015ec ctype 29 API calls 38439->38444 38440->38439 38442 10006305 29 API calls 38441->38442 38442->38439 38445 10006305 29 API calls 38443->38445 38446 10005f99 38444->38446 38448 100060f3 38445->38448 38447 100015a7 ctype 29 API calls 38446->38447 38447->38405 38964 100063c7 29 API calls 2 library calls 38448->38964 38451 6c80ab66 38450->38451 38452 6c80ab88 38451->38452 38453 6c80ab6c 38451->38453 38455 6c80ab93 38452->38455 38457 6c80abbf 38452->38457 38454 6c812e40 VariantClear 38453->38454 38456 6c80ab75 38454->38456 38458 6c812e40 VariantClear 38455->38458 38456->37845 38459 6c812e40 VariantClear 38457->38459 38460 6c80aba7 38458->38460 38461 6c80abc8 38459->38461 38460->37845 38461->37845 38462->37845 38463->37845 38464->37850 38465->37862 38468 6c80a310 38466->38468 38467 6c80a338 38467->38330 38468->38467 38481 6c809ff0 __VEC_memcpy _memmove_s 38468->38481 38470 6c80a32c 38470->38330 38473 6c80a250 38471->38473 38472 6c80a2b7 38484 6c80a1c0 CharUpperW CharUpperW __VEC_memcpy 38472->38484 38473->38472 38477 6c80a2e1 38473->38477 38482 6c8107d0 CharUpperW CharUpperW 38473->38482 38483 6c80a110 __VEC_memcpy 38473->38483 38476 6c80a2c5 38476->38477 38485 6c80a1c0 CharUpperW CharUpperW __VEC_memcpy 38476->38485 38477->38332 38479 6c80a2d7 38479->38332 38481->38470 38482->38473 38483->38473 38484->38476 38485->38479 38486->38337 38487->38337 38489 6c811378 38488->38489 38490 6c81138c GetLastError 38488->38490 38489->38351 38491 6c811399 38490->38491 38495 6c8113ff 38490->38495 38492 6c8128a0 GetCurrentDirectoryW 38491->38492 38493 6c8113bf 38492->38493 38494 6c8113d1 CreateDirectoryW 38493->38494 38493->38495 38496 6c8113e5 38494->38496 38495->38351 38496->38351 38497->38340 38498->38357 38499->38357 38500->38357 38502 1000630f __EH_prolog 38501->38502 38503 100015ec ctype 29 API calls 38502->38503 38504 10006333 38503->38504 38505 100015a7 ctype 29 API calls 38504->38505 38506 1000633e 38505->38506 38507 100015a7 ctype 29 API calls 38506->38507 38508 10006364 38507->38508 38659 100033a2 29 API calls 2 library calls 38508->38659 38510 10005d55 38656 100063c7 29 API calls 2 library calls 38510->38656 38512 100066eb 38511->38512 38660 1000688a 38512->38660 38516 10004863 __EH_prolog 38515->38516 38795 100081ef 38516->38795 38518 1000487b 38616 10004f5e 38518->38616 38812 10017690 InitializeCriticalSection 38518->38812 38520 100049a8 38813 100054e2 38520->38813 38522 100049df 38524 100015ec ctype 29 API calls 38522->38524 38630 10004bb4 38522->38630 38523 10001075 30 API calls 38532 100048a7 38523->38532 38525 10004a08 38524->38525 38526 10001075 30 API calls 38525->38526 38541 10004a29 38525->38541 38526->38541 38527 10004a74 38531 100015a7 ctype 29 API calls 38527->38531 38528 10004abc 38533 10004ba5 38528->38533 38546 10004e20 38528->38546 38549 10004ef8 38528->38549 38551 10004e8b 38528->38551 38825 10001c8a 38528->38825 38855 10003a70 30 API calls 38528->38855 38856 10003a95 30 API calls 38528->38856 38857 10005966 30 API calls __EH_prolog 38528->38857 38535 10004a83 38531->38535 38532->38520 38532->38523 38853 10003f9b 30 API calls __EH_prolog 38532->38853 38858 10005815 30 API calls ctype 38533->38858 38854 100033a2 29 API calls 2 library calls 38535->38854 38538 100053b3 38550 1000163d 30 API calls 38538->38550 38539 10005357 38542 100015a7 ctype 29 API calls 38539->38542 38541->38527 38541->38528 38545 10005366 38542->38545 38543 1000504d 38548 100015a7 ctype 29 API calls 38543->38548 38544 10004a92 DeleteCriticalSection 38558 10004aa7 38544->38558 38870 100033a2 29 API calls 2 library calls 38545->38870 38552 100015a7 ctype 29 API calls 38546->38552 38554 1000506a 38548->38554 38562 100015a7 ctype 29 API calls 38549->38562 38556 100053dc 38550->38556 38574 100015a7 ctype 29 API calls 38551->38574 38557 10004e51 38552->38557 38553 10005375 DeleteCriticalSection 38553->38558 38863 100033a2 29 API calls 2 library calls 38554->38863 38555 1000508e 38566 100015a7 ctype 29 API calls 38555->38566 38561 100053fc 38556->38561 38871 100040e5 38556->38871 38860 100033a2 29 API calls 2 library calls 38557->38860 38560 100015ec ctype 29 API calls 38558->38560 38565 100053a0 38560->38565 38833 1000367f 38561->38833 38844 10012a20 38561->38844 38847 10017570 38561->38847 38569 10004f18 38562->38569 38564 10005079 DeleteCriticalSection 38564->38555 38571 100015a7 ctype 29 API calls 38565->38571 38575 100050c1 38566->38575 38568 10005169 38580 100015a7 ctype 29 API calls 38568->38580 38862 100033a2 29 API calls 2 library calls 38569->38862 38570 10004e60 DeleteCriticalSection 38643 10004e75 38570->38643 38571->38616 38581 10004ebc 38574->38581 38864 100033a2 29 API calls 2 library calls 38575->38864 38576 1000541f 38584 100015a7 ctype 29 API calls 38576->38584 38578 10004f27 DeleteCriticalSection 38585 10004f3c 38578->38585 38586 10005186 38580->38586 38861 100033a2 29 API calls 2 library calls 38581->38861 38582 100050fb 38596 100015a7 ctype 29 API calls 38582->38596 38589 10005430 38584->38589 38597 100015ec ctype 29 API calls 38585->38597 38866 100033a2 29 API calls 2 library calls 38586->38866 38588 100050d0 DeleteCriticalSection 38588->38643 38874 100056b6 29 API calls 2 library calls 38589->38874 38590 100051c2 SysFreeString 38593 100051d6 38590->38593 38600 100015a7 ctype 29 API calls 38593->38600 38594 10004ecb DeleteCriticalSection 38594->38643 38603 1000511b 38596->38603 38605 10004f52 38597->38605 38598 100015ec ctype 29 API calls 38606 10005298 38598->38606 38599 10005195 DeleteCriticalSection 38599->38643 38607 100051eb 38600->38607 38601 1000163d 30 API calls 38601->38630 38602 1000543f 38875 100056eb DeleteCriticalSection 38602->38875 38865 100033a2 29 API calls 2 library calls 38603->38865 38604 10002e98 30 API calls 38604->38630 38611 100015a7 ctype 29 API calls 38605->38611 38612 100015a7 ctype 29 API calls 38606->38612 38867 100033a2 29 API calls 2 library calls 38607->38867 38610 1000512a DeleteCriticalSection 38615 1000513f 38610->38615 38611->38616 38612->38616 38614 1000544a 38876 10003f63 29 API calls 2 library calls 38614->38876 38619 100015ec ctype 29 API calls 38615->38619 38616->38384 38617 100051fa DeleteCriticalSection 38617->38643 38620 10005155 38619->38620 38622 100015a7 ctype 29 API calls 38620->38622 38621 1000521f 38624 1000109b ctype 29 API calls 38621->38624 38622->38616 38623 1000109b ctype 29 API calls 38623->38630 38625 10005224 38624->38625 38627 1000109b ctype 29 API calls 38625->38627 38626 1000109b ctype 29 API calls 38628 10004d6e SysFreeString 38626->38628 38629 10005233 SysFreeString 38627->38629 38628->38630 38631 10005249 38629->38631 38630->38543 38630->38555 38630->38568 38630->38582 38630->38590 38630->38601 38630->38604 38630->38621 38630->38623 38630->38626 38632 100015a7 29 API calls ctype 38630->38632 38633 100040e5 30 API calls 38630->38633 38635 100052a9 38630->38635 38636 10005043 38630->38636 38859 1000124b 30 API calls 38630->38859 38634 100015a7 ctype 29 API calls 38631->38634 38632->38630 38633->38630 38637 1000525e 38634->38637 38638 100015a7 ctype 29 API calls 38635->38638 38829 10003db9 38636->38829 38868 100033a2 29 API calls 2 library calls 38637->38868 38640 100052b8 38638->38640 38642 100015a7 ctype 29 API calls 38640->38642 38641 1000526d DeleteCriticalSection 38641->38643 38644 100052c7 38642->38644 38643->38598 38645 100015a7 ctype 29 API calls 38644->38645 38646 100052d6 38645->38646 38869 100033a2 29 API calls 2 library calls 38646->38869 38648 100052e5 DeleteCriticalSection 38649 100052fa 38648->38649 38650 100015ec ctype 29 API calls 38649->38650 38651 10005310 38650->38651 38652 100015a7 ctype 29 API calls 38651->38652 38652->38616 38656->38381 38657->38384 38658->38381 38659->38510 38663 1000688d 38660->38663 38661 10006706 38661->38384 38663->38661 38665 1000670b 38663->38665 38669 1000684d 8 API calls 38663->38669 38666 10006715 __EH_prolog 38665->38666 38670 6c806460 38666->38670 38667 10006762 38667->38663 38669->38663 38671 6c8064a0 38670->38671 38672 6c80abe0 VariantClear 38671->38672 38673 6c806522 38672->38673 38674 6c806528 38673->38674 38675 6c80ab10 VariantClear 38673->38675 38674->38667 38677 6c80655c 38675->38677 38676 6c806565 38676->38667 38677->38676 38678 6c8065e7 38677->38678 38679 6c8065bd 38677->38679 38681 6c806623 38678->38681 38682 6c8065f6 38678->38682 38680 6c812e40 VariantClear 38679->38680 38684 6c8065c5 38680->38684 38683 6c812e40 VariantClear 38681->38683 38685 6c812e40 VariantClear 38682->38685 38686 6c80663f 38683->38686 38684->38667 38687 6c8065fe 38685->38687 38688 6c80ab10 VariantClear 38686->38688 38687->38667 38689 6c806651 38688->38689 38690 6c80665a 38689->38690 38758 6c8063a0 38689->38758 38690->38667 38692 6c806683 38693 6c806689 38692->38693 38694 6c8066c4 38692->38694 38785 6c81e770 72 API calls 38692->38785 38693->38667 38696 6c80673c 38694->38696 38697 6c8066ec 38694->38697 38712 6c806fdb 38694->38712 38700 6c806791 38696->38700 38701 6c806767 38696->38701 38698 6c8109e0 68 API calls 38697->38698 38705 6c8066f3 38698->38705 38699 6c8109e0 68 API calls 38716 6c8070cd 38699->38716 38703 6c80679b 38700->38703 38704 6c80716a 38700->38704 38702 6c812e40 VariantClear 38701->38702 38706 6c80676f 38702->38706 38707 6c812e40 VariantClear 38703->38707 38708 6c812e40 VariantClear 38704->38708 38705->38667 38706->38667 38709 6c8067bf 38707->38709 38722 6c80688e 38708->38722 38768 6c8062b0 38709->38768 38711 6c8067d5 38713 6c8067db 38711->38713 38714 6c8062b0 VariantClear 38711->38714 38712->38699 38712->38716 38713->38667 38715 6c806810 38714->38715 38715->38684 38717 6c8062b0 VariantClear 38715->38717 38716->38667 38718 6c80682d 38717->38718 38718->38676 38719 6c80ab10 VariantClear 38718->38719 38720 6c806850 38719->38720 38720->38676 38721 6c81df80 68 API calls 38720->38721 38728 6c806884 38721->38728 38722->38667 38723 6c8068ad 38724 6c804dd0 67 API calls 38723->38724 38725 6c8068c0 38724->38725 38780 6c80a360 38725->38780 38728->38722 38728->38723 38787 6c8107d0 CharUpperW CharUpperW 38728->38787 38729 6c8068c9 38736 6c8069f7 38729->38736 38786 6c806250 CreateDirectoryW GetLastError CreateDirectoryW GetCurrentDirectoryW 38729->38786 38731 6c806a86 38734 6c8125a0 10 API calls 38731->38734 38738 6c806c89 38731->38738 38732 6c806a28 38748 6c806a42 38732->38748 38789 6c811140 RemoveDirectoryW RemoveDirectoryW GetCurrentDirectoryW 38732->38789 38733 6c8109e0 68 API calls 38737 6c806e99 38733->38737 38739 6c806aaa 38734->38739 38736->38731 38736->38732 38740 6c812a70 4 API calls 38737->38740 38738->38687 38738->38712 38738->38733 38739->38737 38739->38738 38743 6c806c81 38739->38743 38744 6c806d35 38739->38744 38739->38748 38740->38712 38741 6c806931 38741->38736 38742 6c8069db 38741->38742 38788 6c810f70 CreateFileW CreateFileW SetFileTime CloseHandle GetCurrentDirectoryW 38742->38788 38790 6c8010e0 10 API calls __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 38743->38790 38745 6c806d3e 38744->38745 38746 6c806ebf 38744->38746 38791 6c8010e0 10 API calls __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 38745->38791 38793 6c8117b0 SetFileAttributesW SetFileAttributesW DeleteFileW DeleteFileW GetCurrentDirectoryW 38746->38793 38748->38667 38751 6c8069f4 38751->38736 38753 6c806d55 38753->38687 38754 6c806dc8 38753->38754 38792 6c811210 MoveFileW MoveFileW GetCurrentDirectoryW 38754->38792 38756 6c806dd5 38756->38738 38757 6c806ecb 38756->38757 38757->38737 38757->38748 38759 6c8063f7 38758->38759 38760 6c806419 38759->38760 38761 6c8063fd 38759->38761 38763 6c806435 38760->38763 38794 6c812f70 RaiseException __CxxThrowException@8 38760->38794 38762 6c812e40 VariantClear 38761->38762 38764 6c806406 38762->38764 38766 6c812e40 VariantClear 38763->38766 38764->38692 38767 6c80644a 38766->38767 38767->38692 38769 6c806309 38768->38769 38770 6c80630f 38769->38770 38772 6c80632d 38769->38772 38771 6c812e40 VariantClear 38770->38771 38774 6c806318 38771->38774 38773 6c806338 38772->38773 38775 6c80637b 38772->38775 38776 6c812e40 VariantClear 38773->38776 38774->38711 38777 6c812e40 VariantClear 38775->38777 38778 6c806361 38776->38778 38779 6c806384 38777->38779 38778->38711 38779->38711 38781 6c80a51c 38780->38781 38784 6c80a399 38780->38784 38781->38729 38782 6c80a2f0 __VEC_memcpy 38782->38784 38783 6c80a240 3 API calls 38783->38784 38784->38781 38784->38782 38784->38783 38785->38694 38786->38741 38787->38728 38788->38751 38789->38748 38790->38738 38791->38753 38792->38756 38793->38756 38794->38763 38796 100081f9 __EH_prolog 38795->38796 38797 100083a5 38796->38797 38877 1000841c 30 API calls ctype 38796->38877 38797->38518 38800 10008241 38801 100083ff 38800->38801 38878 1000841c 30 API calls ctype 38800->38878 38803 100015a7 ctype 29 API calls 38801->38803 38802 100082b6 38804 100015a7 ctype 29 API calls 38802->38804 38803->38797 38807 100082c2 38804->38807 38805 10008292 38805->38801 38805->38802 38806 10008358 38808 100015a7 ctype 29 API calls 38806->38808 38807->38806 38809 100040e5 30 API calls 38807->38809 38810 10008399 38808->38810 38809->38807 38811 100015a7 ctype 29 API calls 38810->38811 38811->38797 38812->38532 38879 100055b0 38813->38879 38816 100015ec ctype 29 API calls 38817 10005501 38816->38817 38822 10005524 38817->38822 38888 100034b0 30 API calls 38817->38888 38819 100055ab 38819->38522 38820 100040e5 30 API calls 38823 1000558b 38820->38823 38821 100034b0 30 API calls 38821->38822 38822->38821 38822->38823 38824 100040e5 30 API calls 38822->38824 38823->38819 38823->38820 38824->38822 38826 10001c8f __EH_prolog 38825->38826 38889 10001bb2 38826->38889 38828 10001cb6 38828->38528 38830 10003dca 38829->38830 38832 10003df9 38830->38832 38902 100189b4 RaiseException 38830->38902 38832->38538 38832->38539 38834 100015ec ctype 29 API calls 38833->38834 38835 10003691 38834->38835 38836 100015ec ctype 29 API calls 38835->38836 38837 1000369c 38836->38837 38838 100036cf 38837->38838 38840 100040e5 30 API calls 38837->38840 38839 10003706 38838->38839 38841 100040e5 30 API calls 38838->38841 38842 10003731 38839->38842 38903 1000224f 38839->38903 38840->38837 38841->38838 38842->38576 38845 10012a24 38844->38845 38846 10012a27 VirtualAlloc 38844->38846 38845->38576 38846->38576 38944 10019cb8 38847->38944 38850 10017593 38850->38576 38851 10017598 GetLastError 38852 100175a2 38851->38852 38852->38576 38853->38532 38854->38544 38855->38528 38856->38528 38857->38528 38858->38630 38859->38630 38860->38570 38861->38594 38862->38578 38863->38564 38864->38588 38865->38610 38866->38599 38867->38617 38868->38641 38869->38648 38870->38553 38955 10001615 38871->38955 38874->38602 38875->38614 38876->38616 38877->38800 38878->38805 38880 100015ec ctype 29 API calls 38879->38880 38881 100055b8 38880->38881 38882 100015ec ctype 29 API calls 38881->38882 38883 100055c0 38882->38883 38884 100015ec ctype 29 API calls 38883->38884 38885 100055c8 38884->38885 38886 100015ec ctype 29 API calls 38885->38886 38887 100054f9 38886->38887 38887->38816 38888->38817 38890 10001bb7 __EH_prolog 38889->38890 38891 10001075 30 API calls 38890->38891 38894 10001c5a 38890->38894 38892 10001c48 38891->38892 38892->38894 38895 10001f31 38892->38895 38894->38828 38896 10001f3b __EH_prolog 38895->38896 38897 10012a20 VirtualAlloc 38896->38897 38898 10001fd1 38897->38898 38899 10001fed 38898->38899 38901 100189b4 RaiseException 38898->38901 38899->38894 38901->38899 38902->38832 38905 10002259 38903->38905 38907 10002f54 38905->38907 38908 10002f61 38907->38908 38909 10002288 38908->38909 38912 10006814 38908->38912 38917 100068c9 38908->38917 38909->38842 38913 1000681f 38912->38913 38924 6c807350 38913->38924 38934 6c801be0 38913->38934 38914 10006833 38914->38908 38920 100068d5 38917->38920 38918 10006982 38918->38908 38919 1000670b 96 API calls 38919->38920 38920->38918 38920->38919 38922 1000688a 99 API calls 38920->38922 38939 100045ee 38920->38939 38943 1000684d 8 API calls 38920->38943 38922->38920 38925 6c807516 38924->38925 38929 6c807389 38924->38929 38925->38914 38926 6c8063a0 VariantClear RaiseException 38927 6c807491 38926->38927 38928 6c8074eb 38927->38928 38931 6c811060 SetFileAttributesW SetFileAttributesW GetCurrentDirectoryW 38927->38931 38928->38914 38929->38925 38930 6c80742b SetFileTime 38929->38930 38933 6c807462 38929->38933 38932 6c801be0 CloseHandle GetLastError 38930->38932 38931->38928 38932->38933 38933->38925 38933->38926 38933->38927 38935 6c801be8 CloseHandle 38934->38935 38936 6c801bf3 38934->38936 38935->38936 38937 6c801bfd GetLastError 38935->38937 38936->38914 38938 6c801c07 38937->38938 38938->38914 38940 1000460f 38939->38940 38941 100045ff 38939->38941 38940->38920 38942 6c801c20 WriteFile GetLastError 38941->38942 38942->38940 38943->38920 38945 1001c480 30 API calls 38944->38945 38946 10019cc8 38945->38946 38947 10019d0b 38946->38947 38949 10019cd6 CreateThread 38946->38949 38948 100189ee ctype 29 API calls 38947->38948 38950 10019d11 38948->38950 38951 10019d03 GetLastError 38949->38951 38952 10017589 38949->38952 38950->38952 38954 1001c3fb 35 API calls 38950->38954 38951->38947 38952->38850 38952->38851 38954->38952 38956 1000163c 38955->38956 38957 1000161d 38955->38957 38956->38556 38958 1000163d 30 API calls 38957->38958 38958->38956 38959->38408 38960->38408 38961->38408 38962->38405 38963->38436 38964->38405 38966 10006b39 38965->38966 38970 10006b4a 38965->38970 38966->38970 38971 10006b51 38966->38971 38969 1000109b ctype 29 API calls 38969->38970 38970->37874 38972 10006b5b __EH_prolog 38971->38972 38973 100015a7 ctype 29 API calls 38972->38973 38974 10006b74 38973->38974 38979 10006b9e 38974->38979 38977 10006b44 38977->38969 38980 10006ba8 __EH_prolog 38979->38980 38981 100015a7 ctype 29 API calls 38980->38981 38982 10006bc1 38981->38982 38983 100015a7 ctype 29 API calls 38982->38983 38984 10006bd0 38983->38984 38985 100015a7 ctype 29 API calls 38984->38985 38986 10006bdf 38985->38986 38987 100015a7 ctype 29 API calls 38986->38987 38988 10006bee 38987->38988 38989 100015a7 ctype 29 API calls 38988->38989 38990 10006bfd 38989->38990 38997 10006c15 38990->38997 38993 6c8018e0 38994 6c8018ef 38993->38994 38995 6c8018f8 38993->38995 39033 6c801950 38994->39033 38995->38977 38998 10006c1f __EH_prolog 38997->38998 38999 100015a7 ctype 29 API calls 38998->38999 39000 10006c3a 38999->39000 39001 100015a7 ctype 29 API calls 39000->39001 39002 10006c4f 39001->39002 39003 100015a7 ctype 29 API calls 39002->39003 39004 10006c5a 39003->39004 39005 100015a7 ctype 29 API calls 39004->39005 39006 10006c6f 39005->39006 39007 100015a7 ctype 29 API calls 39006->39007 39008 10006c7a 39007->39008 39009 100015a7 ctype 29 API calls 39008->39009 39010 10006c8f 39009->39010 39011 100015a7 ctype 29 API calls 39010->39011 39012 10006c9a 39011->39012 39013 100015a7 ctype 29 API calls 39012->39013 39014 10006cac 39013->39014 39015 100015a7 ctype 29 API calls 39014->39015 39016 10006cb7 39015->39016 39017 100015ec ctype 29 API calls 39016->39017 39018 10006cce 39017->39018 39019 100015a7 ctype 29 API calls 39018->39019 39020 10006cd9 39019->39020 39021 100015a7 ctype 29 API calls 39020->39021 39022 10006ce5 39021->39022 39023 100015ec ctype 29 API calls 39022->39023 39024 10006cfc 39023->39024 39025 100015a7 ctype 29 API calls 39024->39025 39026 10006d07 39025->39026 39027 100015a7 ctype 29 API calls 39026->39027 39028 10006d13 39027->39028 39029 100015a7 ctype 29 API calls 39028->39029 39030 10006d1f 39029->39030 39031 100015a7 ctype 29 API calls 39030->39031 39032 10006b80 39031->39032 39032->38977 39032->38993 39034 6c80196b CloseHandle 39033->39034 39035 6c801976 39033->39035 39034->39035 39036 6c801989 39035->39036 39038 6c825ff4 67 API calls 7 library calls 39035->39038 39036->38995 39038->39036 39040 6c815478 39039->39040 39041 6c81547d 39039->39041 39059 6c80ed10 68 API calls 2 library calls 39040->39059 39043 6c815509 39041->39043 39060 6c8159c0 68 API calls 3 library calls 39041->39060 39043->37328 39045 6c8154a9 39046 6c8154c0 39045->39046 39061 6c825bd8 6 API calls _memmove_s 39045->39061 39049 6c8154cd 39046->39049 39062 6c825bd8 6 API calls _memmove_s 39046->39062 39049->39043 39063 6c825ff4 67 API calls 7 library calls 39049->39063 39051->37328 39052->37328 39053->37328 39054->37328 39055->37302 39056->37304 39057->37299 39058->37298 39059->39041 39060->39045 39061->39046 39062->39049 39063->39043 39217 1000331c 39218 10003336 39217->39218 39220 10003370 39218->39220 39221 100030fd 39218->39221 39222 10003107 __EH_prolog 39221->39222 39223 10003147 39222->39223 39225 1000ab8d 39222->39225 39223->39220 39226 1000ab97 __EH_prolog 39225->39226 39227 10001075 30 API calls 39226->39227 39228 1000aba2 39227->39228 39229 1000abb6 39228->39229 39231 10006a20 39228->39231 39229->39223 39232 10006a2a __EH_prolog 39231->39232 39235 10001b41 GetSystemInfo 39232->39235 39234 10006a94 39234->39229 39235->39234
                                                          APIs
                                                            • Part of subcall function 6C8107D0: CharUpperW.USER32(?,00000000,?,6C80FCF3,?,6C80FE6C,?,00000000,?,00000010,0FD3DAC1,?,00000000,00000000), ref: 6C8107F7
                                                            • Part of subcall function 6C8107D0: CharUpperW.USER32(?,?,6C80FE6C,?,00000000,?,00000010,0FD3DAC1,?,00000000,00000000), ref: 6C810804
                                                          • _memset.LIBCMT ref: 6C80B3D4
                                                          • VariantClear.OLEAUT32(?), ref: 6C80BEEE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CharUpper$ClearVariant_memset
                                                          • String ID: !$001$R$Unknown error$a$exe$iso$r$rar$udf
                                                          • API String ID: 2702283269-2136912355
                                                          • Opcode ID: 76fcaa24eb1e866c62b14a825a5b0d7db85a1ad2c355f0bbe0d7cb2981099d32
                                                          • Instruction ID: 82f7fded76c003bbe5950afe4004f984007bccac00d037914226b9c9f2883cc9
                                                          • Opcode Fuzzy Hash: 76fcaa24eb1e866c62b14a825a5b0d7db85a1ad2c355f0bbe0d7cb2981099d32
                                                          • Instruction Fuzzy Hash: 07C26E71A012288FCB30CF68CE80BDAB7B5AF49304F1449E9D949A7751DB35AE85CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1059 6c808ab0-6c808b3b 1060 6c808b42-6c808b45 1059->1060 1061 6c808b3d-6c808b40 1059->1061 1062 6c808b48-6c808b52 1060->1062 1061->1062 1063 6c808b58-6c808baf call 6c82514c 1062->1063 1064 6c808cab-6c808cba call 6c825f2a 1062->1064 1069 6c808bb1-6c808bf6 call 6c812470 1063->1069 1070 6c808c1c-6c808c24 1063->1070 1071 6c808cbc-6c808cca call 6c82663b 1064->1071 1072 6c808cfd-6c808d25 call 6c808400 1064->1072 1089 6c808bf8-6c808bf9 FindClose 1069->1089 1090 6c808bff-6c808c03 1069->1090 1076 6c808c26-6c808c2e 1070->1076 1077 6c808c4d-6c808ca2 call 6c8251d6 1070->1077 1083 6c808ccf-6c808ce1 call 6c82663b 1071->1083 1086 6c808d27-6c808d2c 1072->1086 1087 6c808d2f-6c808d80 1072->1087 1078 6c808c30-6c808c35 1076->1078 1079 6c808c37-6c808c3a 1076->1079 1077->1063 1096 6c808ca8 1077->1096 1084 6c808c41-6c808c48 call 6c810880 1078->1084 1079->1084 1085 6c808c3c 1079->1085 1092 6c808ce6-6c808cf8 call 6c82663b 1083->1092 1084->1077 1085->1084 1086->1087 1094 6c808d82-6c808d9d 1087->1094 1095 6c808de4-6c808dee 1087->1095 1089->1090 1090->1083 1097 6c808c09-6c808c16 1090->1097 1092->1072 1094->1095 1105 6c808d9f-6c808ddf call 6c8251d6 1094->1105 1099 6c809562-6c8095fb call 6c8251d6 1095->1099 1100 6c808df4-6c808e4e call 6c82514c 1095->1100 1096->1064 1097->1070 1097->1092 1122 6c8095ff-6c809617 1099->1122 1106 6c808e50-6c808e65 1100->1106 1107 6c808e67-6c808e9d call 6c812470 1100->1107 1105->1122 1108 6c808ec3-6c808ede 1106->1108 1114 6c808ea6-6c808eaa 1107->1114 1115 6c808e9f-6c808ea0 FindClose 1107->1115 1126 6c808ee4-6c808f8d call 6c809f10 1108->1126 1127 6c809618-6c80966a call 6c8251d6 * 2 1108->1127 1120 6c808eb0-6c808ebd 1114->1120 1121 6c809969-6c809980 call 6c82663b 1114->1121 1115->1114 1120->1108 1120->1121 1135 6c808f93-6c808f98 1126->1135 1136 6c8090ff-6c80912d call 6c80cae0 1126->1136 1127->1122 1135->1136 1139 6c808f9e-6c808faa 1135->1139 1144 6c809133-6c809158 1136->1144 1145 6c80966c-6c809709 call 6c8251d6 call 6c8082a0 call 6c8251d6 * 2 1136->1145 1142 6c808fc1-6c808fc9 1139->1142 1143 6c808fac 1139->1143 1142->1136 1148 6c808fcf-6c808ff9 call 6c801640 call 6c817240 1142->1148 1147 6c808fb0-6c808fb2 1143->1147 1161 6c80970e-6c809761 call 6c8251d6 call 6c8082a0 1144->1161 1162 6c80915e-6c809160 1144->1162 1145->1122 1147->1136 1149 6c808fb8-6c808fbf 1147->1149 1159 6c8090e6-6c8090fc call 6c8251d6 1148->1159 1160 6c808fff-6c80900f call 6c810790 1148->1160 1149->1142 1149->1147 1159->1136 1160->1159 1176 6c809015-6c809058 call 6c801660 call 6c801460 call 6c8251d6 1160->1176 1206 6c809762-6c8097a8 call 6c8251d6 * 2 1161->1206 1165 6c809162-6c8091c6 call 6c8251d6 call 6c8082a0 call 6c8251d6 1162->1165 1166 6c8091cb-6c8091d0 1162->1166 1221 6c809549-6c809559 1165->1221 1172 6c8091d6-6c8091e3 1166->1172 1173 6c8092a8 1166->1173 1177 6c8091e9 1172->1177 1178 6c8092af 1172->1178 1173->1178 1176->1159 1224 6c80905e-6c80906c 1176->1224 1182 6c8091f0-6c809206 call 6c809ae0 1177->1182 1183 6c8092b1-6c8092e4 1178->1183 1184 6c8092ea-6c80931a call 6c82514c 1178->1184 1202 6c809296-6c8092a2 1182->1202 1203 6c80920c-6c809210 1182->1203 1183->1161 1183->1184 1204 6c809344-6c809375 1184->1204 1205 6c80931c-6c809322 1184->1205 1202->1173 1202->1182 1203->1202 1211 6c809216-6c809251 1203->1211 1222 6c80937b-6c809382 1204->1222 1223 6c8097ad-6c80980e call 6c8251d6 * 2 call 6c8082a0 1204->1223 1212 6c809324-6c809335 1205->1212 1213 6c809337-6c809341 call 6c8251d6 1205->1213 1206->1122 1245 6c809253-6c809259 1211->1245 1246 6c80925b-6c809284 call 6c8255f0 1211->1246 1212->1212 1212->1213 1213->1204 1221->1100 1229 6c80955f 1221->1229 1227 6c809384-6c809396 1222->1227 1228 6c80939c-6c8093ab 1222->1228 1223->1206 1231 6c80907d-6c809085 1224->1231 1232 6c80906e-6c809072 1224->1232 1227->1223 1227->1228 1234 6c8093e9-6c8093f9 1228->1234 1235 6c8093ad 1228->1235 1229->1099 1231->1159 1233 6c809087-6c8090b6 call 6c801640 call 6c817240 call 6c8251d6 1231->1233 1232->1159 1237 6c809074-6c80907b 1232->1237 1233->1159 1276 6c8090b8-6c8090cc call 6c8107d0 1233->1276 1240 6c80940b 1234->1240 1241 6c8093fb-6c809402 1234->1241 1244 6c8093b0-6c8093bd 1235->1244 1237->1231 1237->1232 1251 6c80940d-6c809459 call 6c808670 1240->1251 1241->1240 1250 6c809404-6c809409 1241->1250 1253 6c8093e0-6c8093e7 1244->1253 1254 6c8093bf-6c8093cf 1244->1254 1245->1246 1247 6c809288-6c809292 1245->1247 1246->1247 1247->1202 1250->1251 1262 6c80945e-6c809465 1251->1262 1253->1234 1253->1244 1254->1223 1268 6c8093d5-6c8093dc 1254->1268 1266 6c809813-6c8098b9 call 6c8251d6 * 2 call 6c8082a0 call 6c8251d6 * 2 1262->1266 1267 6c80946b-6c809470 1262->1267 1266->1122 1273 6c809472-6c80949c 1267->1273 1274 6c80949e-6c8094a5 1267->1274 1268->1253 1277 6c8094ac-6c8094d6 1273->1277 1274->1277 1276->1159 1287 6c8090ce-6c8090e1 call 6c809d00 * 2 1276->1287 1279 6c8094dc-6c809544 call 6c8251d6 * 2 call 6c8082a0 call 6c8251d6 1277->1279 1280 6c8098be-6c809964 call 6c8251d6 * 2 call 6c8082a0 call 6c8251d6 * 2 1277->1280 1279->1221 1280->1122 1287->1159
                                                          APIs
                                                          • FindClose.KERNEL32(FFFFFFFF,?), ref: 6C808BF9
                                                          • _malloc.LIBCMT ref: 6C808CB0
                                                          • __CxxThrowException@8.LIBCMT ref: 6C808CCA
                                                          • __CxxThrowException@8.LIBCMT ref: 6C808CE1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C808CF8
                                                          • FindClose.KERNEL32(FFFFFFFF,?), ref: 6C808EA0
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80997B
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$CloseFind$ExceptionRaise_malloc
                                                          • String ID: 001$rar
                                                          • API String ID: 231924613-402399766
                                                          • Opcode ID: bbe8464737979078db16bd53bfbdcdeb73146d465fd018f6f1cdc6662c128bc8
                                                          • Instruction ID: bbd2d586527720033645e5ec1a6dce83b098ec800425e7bbbcffdbea2808fe41
                                                          • Opcode Fuzzy Hash: bbe8464737979078db16bd53bfbdcdeb73146d465fd018f6f1cdc6662c128bc8
                                                          • Instruction Fuzzy Hash: 039246B16083819FC334CF69CA80A9BB7E5BF88308F548E2DE59987751D735E845CB92

                                                          Control-flow Graph

                                                          APIs
                                                          • _memset.LIBCMT ref: 6C822B0E
                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 6C822B20
                                                          • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 6C822B3C
                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 6C822B48
                                                          • FindResourceW.KERNEL32(6C800000,00000068,RC_DATA), ref: 6C822B7E
                                                          • LoadLibraryW.KERNEL32(?,?), ref: 6C822BA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Find$LibraryLoad$CloseFileFirstResource_memset
                                                          • String ID: 7z.dll$RC_DATA
                                                          • API String ID: 597928718-3209790242
                                                          • Opcode ID: 4a7a5c64daabe40d0b2bcc5cb7dff68bbbe1956fdbdd10798fdae1a51414fe04
                                                          • Instruction ID: 14658141cdd3adc1ff74b4e8067d82ecd835d831d8a2aef36e8dc53460171ce9
                                                          • Opcode Fuzzy Hash: 4a7a5c64daabe40d0b2bcc5cb7dff68bbbe1956fdbdd10798fdae1a51414fe04
                                                          • Instruction Fuzzy Hash: A741A471609300ABC730DF68CA48B9B77E8AB9535CF001D69F44997640DB38D849CBD3
                                                          APIs
                                                          • FindClose.KERNEL32(FFFFFFFF,?), ref: 6C8137C4
                                                          • GetLastError.KERNEL32(?), ref: 6C8137D1
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorFindLast
                                                          • String ID:
                                                          • API String ID: 754982922-0
                                                          • Opcode ID: 0f13dc0e4456a46b26d6c837bcf4759a24b8e8dea8f23a1813d9acb275e913dc
                                                          • Instruction ID: 080f7a1f0f66fa7b3bb4b4cf70c07bfce7a93f990fea8eba882f93ede02d4b2c
                                                          • Opcode Fuzzy Hash: 0f13dc0e4456a46b26d6c837bcf4759a24b8e8dea8f23a1813d9acb275e913dc
                                                          • Instruction Fuzzy Hash: EC828CB16083419FD724CF58CA80B9BB7E5AFC9318F144E2DE98997B50D734E849CB92

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2022 6c822980-6c82299d LoadResource 2023 6c822a1b-6c822a24 2022->2023 2024 6c82299f-6c8229ab SizeofResource 2022->2024 2024->2023 2025 6c8229ad-6c8229b8 LockResource 2024->2025 2025->2023 2026 6c8229ba-6c8229da CreateFileW 2025->2026 2026->2023 2027 6c8229dc-6c8229ed WriteFile 2026->2027 2028 6c8229f6 2027->2028 2029 6c8229ef-6c8229f4 2027->2029 2030 6c8229f9-6c822a02 CloseHandle 2028->2030 2029->2028 2029->2030 2031 6c822a10-6c822a18 2030->2031 2032 6c822a04-6c822a0a DeleteFileW 2030->2032 2032->2031
                                                          APIs
                                                          • LoadResource.KERNEL32(6C800000,00000000,6C800000,?,?,6C822B94,?), ref: 6C822993
                                                          • SizeofResource.KERNEL32(6C800000,00000000), ref: 6C8229A1
                                                          • LockResource.KERNEL32(00000000), ref: 6C8229AE
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 6C8229CF
                                                          • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 6C8229E5
                                                          • CloseHandle.KERNEL32(00000000), ref: 6C8229FA
                                                          • DeleteFileW.KERNEL32(00000000), ref: 6C822A0A
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FileResource$CloseCreateDeleteHandleLoadLockSizeofWrite
                                                          • String ID:
                                                          • API String ID: 406028064-0
                                                          • Opcode ID: 69cf6245792f3947205ccf1b408e9d188aa79f9f390fc5a0c445e74585e1c86f
                                                          • Instruction ID: 55fdeeb6957fd08ed59017fd11cabee9a1712678ec14d862a6b547f2b381f47f
                                                          • Opcode Fuzzy Hash: 69cf6245792f3947205ccf1b408e9d188aa79f9f390fc5a0c445e74585e1c86f
                                                          • Instruction Fuzzy Hash: C1112631742A047BD7308AA98C5CF9ABB7C9B8A635F104975FE45E7280D67DDC42C6E0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2033 6c814c00-6c814c4c 2034 6c814c52-6c814c66 2033->2034 2035 6c8152a9-6c8152c0 2033->2035 2036 6c814d12-6c814db3 call 6c82514c 2034->2036 2037 6c814c6c-6c814ccd call 6c82514c call 6c812470 2034->2037 2042 6c814de0-6c814e22 2036->2042 2043 6c814db5-6c814dbb 2036->2043 2045 6c814cd2-6c814cdd 2037->2045 2055 6c814ec8-6c814ef5 call 6c80cae0 2042->2055 2056 6c814e28-6c814e3d 2042->2056 2046 6c814dd3-6c814ddd call 6c8251d6 2043->2046 2047 6c814dbd 2043->2047 2048 6c814ce6-6c814cea 2045->2048 2049 6c814cdf-6c814ce0 FindClose 2045->2049 2046->2042 2051 6c814dc0-6c814dd1 2047->2051 2053 6c814cf0-6c814cfc 2048->2053 2054 6c814fc3-6c814fe4 call 6c8251d6 2048->2054 2049->2048 2051->2046 2051->2051 2053->2054 2059 6c814d02-6c814d0f call 6c8251d6 2053->2059 2073 6c815296-6c8152a3 2054->2073 2069 6c8152c1-6c8152c6 2055->2069 2070 6c814efb-6c814efe 2055->2070 2060 6c814ea5-6c814eab 2056->2060 2061 6c814e3f-6c814e60 call 6c82514c 2056->2061 2059->2036 2067 6c814eb0-6c814ebf 2060->2067 2076 6c814e90-6c814ea1 2061->2076 2077 6c814e62-6c814e68 2061->2077 2067->2067 2068 6c814ec1-6c814ec4 2067->2068 2068->2055 2078 6c815327-6c815363 call 6c8251d6 call 6c8082a0 2069->2078 2079 6c8152c8-6c8152d2 2069->2079 2074 6c814f00-6c814f0b 2070->2074 2075 6c814f66-6c814fab call 6c815440 2070->2075 2073->2034 2073->2035 2074->2075 2080 6c814f0d-6c814f29 call 6c809ae0 2074->2080 2109 6c814fb1-6c814fbb 2075->2109 2110 6c815364-6c81539d call 6c8251d6 call 6c8082a0 2075->2110 2076->2060 2081 6c814e83-6c814e8d call 6c8251d6 2077->2081 2082 6c814e6a 2077->2082 2084 6c815315-6c815322 call 6c82663b 2079->2084 2085 6c8152d4-6c8152d7 2079->2085 2104 6c814f54-6c814f64 2080->2104 2105 6c814f2b-6c814f2f 2080->2105 2081->2076 2089 6c814e70-6c814e81 2082->2089 2084->2078 2092 6c8152d9-6c8152e6 call 6c82663b 2085->2092 2093 6c8152eb-6c8152ef 2085->2093 2089->2081 2089->2089 2092->2093 2095 6c8152f1-6c8152fe call 6c82663b 2093->2095 2096 6c815303-6c815310 call 6c82663b 2093->2096 2095->2096 2096->2084 2104->2075 2104->2080 2105->2104 2107 6c814f31-6c814f50 2105->2107 2107->2104 2112 6c815271-6c81528e call 6c8251d6 call 6c8082a0 2109->2112 2113 6c814fc1 2109->2113 2126 6c815293 2112->2126 2116 6c814ff4-6c815041 call 6c82514c call 6c80abe0 2113->2116 2128 6c815043-6c815049 2116->2128 2129 6c81504f-6c815051 2116->2129 2126->2073 2128->2129 2130 6c815262-6c81526f call 6c8251d6 2128->2130 2131 6c815057-6c81506f call 6c80ab10 2129->2131 2132 6c81539e-6c8153e4 call 6c8251d6 * 2 call 6c8082a0 2129->2132 2130->2112 2140 6c8153e5-6c81542b call 6c8251d6 * 2 call 6c8082a0 2131->2140 2141 6c815075-6c815079 2131->2141 2143 6c815092-6c8150a9 call 6c81e6e0 2141->2143 2144 6c81507b-6c81508d call 6c8251d6 2141->2144 2156 6c8150b2-6c8150c4 call 6c8251d6 2143->2156 2157 6c8150ab-6c8150b0 2143->2157 2154 6c81524c-6c81525a 2144->2154 2159 6c814ff0 2154->2159 2160 6c815260 2154->2160 2156->2154 2157->2156 2162 6c8150c9-6c8150df call 6c814a10 2157->2162 2159->2116 2160->2112 2167 6c8150e1-6c8150e5 2162->2167 2168 6c8150e9-6c815103 call 6c814a10 2162->2168 2167->2168 2171 6c815105-6c81510b 2168->2171 2172 6c81510f-6c8151cf call 6c814ac0 call 6c814b60 * 2 2168->2172 2171->2172 2179 6c8151d1 call 6c801680 2172->2179 2180 6c8151d6-6c8151de 2172->2180 2179->2180 2182 6c8151e0-6c8151ef 2180->2182 2182->2182 2183 6c8151f1-6c815248 call 6c823910 call 6c826308 call 6c8251d6 call 6c815560 call 6c8251d6 2182->2183 2183->2154
                                                          APIs
                                                            • Part of subcall function 6C812470: FindClose.KERNEL32(?,0FD3DAC1,6C830658,00000000), ref: 6C8124C4
                                                            • Part of subcall function 6C812470: FindFirstFileW.KERNEL32(6C8350B8,?,0FD3DAC1,6C830658,00000000), ref: 6C8124DE
                                                            • Part of subcall function 6C812470: FindFirstFileW.KERNEL32(?,?), ref: 6C81253A
                                                          • FindClose.KERNEL32(FFFFFFFF,?,?,?,?,?,?,?,?,?,?), ref: 6C814CE0
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 74e95f926c6196cf34e37bcab60476969264aa5e873cf37c9bb3c3828ff9f933
                                                          • Instruction ID: 7a0c853c04c1d2313c83ed1bc77fa10ad301fc414adce1409724cff9e68da5f7
                                                          • Opcode Fuzzy Hash: 74e95f926c6196cf34e37bcab60476969264aa5e873cf37c9bb3c3828ff9f933
                                                          • Instruction Fuzzy Hash: F5326AB16083818FD320CF68C980A9BB7E4BFC8318F144E2EE59997750D775E949CB92
                                                          APIs
                                                          • FindClose.KERNEL32(?,0FD3DAC1,6C830658,00000000), ref: 6C8124C4
                                                          • FindFirstFileW.KERNEL32(6C8350B8,?,0FD3DAC1,6C830658,00000000), ref: 6C8124DE
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 6C81253A
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Find$FileFirst$Close
                                                          • String ID:
                                                          • API String ID: 2810966245-0
                                                          • Opcode ID: 653e8fbfc40524a3a27106b97aaaa68d816f78b7b07a292ad106cc6b37f10957
                                                          • Instruction ID: 5b1f2588cc8f7a4171f3d530de3e7cb663be00cac43b9b878cfe6096a967f635
                                                          • Opcode Fuzzy Hash: 653e8fbfc40524a3a27106b97aaaa68d816f78b7b07a292ad106cc6b37f10957
                                                          • Instruction Fuzzy Hash: CC3174715097428FC760DF28C94879BB7E4FF49328F100F29E4A983680E734A909CB92
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81E9AF
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExceptionException@8RaiseThrow
                                                          • String ID: Empty file path
                                                          • API String ID: 3976011213-1562447899
                                                          • Opcode ID: 55fb8276b14fd0eef0d257a1a452a4081250f95cb914d8edca86b52e790ecdfb
                                                          • Instruction ID: c514651512b49897599b0a2267b353d03268f3a8c8ff5ed0fd6218cfa9cc5be9
                                                          • Opcode Fuzzy Hash: 55fb8276b14fd0eef0d257a1a452a4081250f95cb914d8edca86b52e790ecdfb
                                                          • Instruction Fuzzy Hash: A4C1C271E052599FCB24CFA8CA84ADEBBF5BF49304F144869E805A7F40D7719A09CBE1
                                                          APIs
                                                          • GetSystemInfo.KERNEL32(?), ref: 10001B4B
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem
                                                          • String ID:
                                                          • API String ID: 31276548-0
                                                          • Opcode ID: 62b61814a3264c2a0f4f706347acbeacecd619b648c4921b8ba18a43bc66cf00
                                                          • Instruction ID: d3e97598432a4a316c69c7b199a975740681d618dafaa63f0622d860b7c48d59
                                                          • Opcode Fuzzy Hash: 62b61814a3264c2a0f4f706347acbeacecd619b648c4921b8ba18a43bc66cf00
                                                          • Instruction Fuzzy Hash: A9C09B7490431D97DB00E7E5D9C9D8EB7FCB608204F500451E555F3141E670F94587A1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 6c8182b0-6c81830c call 6c80f940 3 6c818329-6c818378 call 6c804dd0 call 6c817df0 call 6c80fb40 call 6c803be0 0->3 4 6c81830e-6c818324 call 6c82663b 0->4 14 6c818395-6c8183bb call 6c8042e0 call 6c825f2a 3->14 15 6c81837a-6c818390 call 6c82663b 3->15 4->3 21 6c8183d0-6c8183e2 call 6c818eb0 14->21 22 6c8183bd-6c8183cb call 6c82663b 14->22 15->14 26 6c8183e4-6c8183e9 21->26 27 6c8183ec-6c8183fe call 6c816cc0 21->27 22->21 26->27 30 6c818400-6c818416 call 6c82663b 27->30 31 6c81841b-6c818424 27->31 30->31 33 6c818426-6c81842d 31->33 34 6c81842f 31->34 33->34 35 6c818433-6c818436 33->35 34->35 36 6c818438-6c81843c 35->36 37 6c81846d-6c81849a call 6c8172f0 35->37 38 6c818452-6c818468 call 6c82663b 36->38 39 6c81843e-6c818441 36->39 45 6c8184b7-6c8184bb 37->45 46 6c81849c-6c8184b2 call 6c82663b 37->46 38->37 39->38 41 6c818443-6c818450 call 6c8026c0 39->41 41->37 41->38 48 6c8184c1-6c8184c8 45->48 49 6c818834-6c818847 call 6c8109e0 45->49 46->45 52 6c818c70-6c818caf call 6c814c00 48->52 53 6c8184ce-6c8184db call 6c8026c0 48->53 58 6c818853 49->58 59 6c818849-6c818851 call 6c818110 49->59 57 6c818cb4-6c818cbc 52->57 64 6c8184e1-6c8184e8 53->64 65 6c818819-6c81882f call 6c82663b 53->65 61 6c818d19-6c818d1e 57->61 62 6c818cbe 57->62 66 6c818855-6c81885e 58->66 59->66 74 6c818d20-6c818d23 61->74 75 6c818d65-6c818dd3 call 6c82663b * 4 61->75 67 6c818cc0-6c818cc5 62->67 68 6c818cfe-6c818d14 call 6c82663b 62->68 70 6c818502-6c818538 call 6c8149e0 call 6c82e5ce 64->70 71 6c8184ea-6c8184f0 64->71 65->49 72 6c818860-6c818865 66->72 73 6c818868-6c81892e call 6c801460 call 6c8149e0 call 6c801460 call 6c817bc0 66->73 77 6c818cc7-6c818ccc 67->77 78 6c818ce9-6c818cf9 call 6c82663b 67->78 68->61 112 6c818553-6c81855a 70->112 113 6c81853a-6c81854d call 6c8193a0 70->113 71->70 80 6c8184f2-6c8184fd call 6c807e60 71->80 72->73 147 6c818930-6c81893d 73->147 148 6c81893f 73->148 83 6c818d25-6c818d28 74->83 84 6c818d2a-6c818d3c call 6c809990 74->84 77->74 86 6c818cce-6c818ce4 call 6c82663b 77->86 78->68 80->70 83->84 92 6c818d42-6c818d44 83->92 84->92 86->78 94 6c818b32-6c818b47 call 6c809990 92->94 95 6c818d4a-6c818d60 call 6c82663b 92->95 109 6c818b51-6c818b94 call 6c80fc00 call 6c818de0 call 6c804c80 94->109 110 6c818b49-6c818b4e 94->110 95->75 110->109 118 6c818569 112->118 119 6c81855c-6c818567 112->119 113->112 124 6c81856d-6c8185ac call 6c801460 call 6c8181d0 118->124 119->118 119->124 139 6c8185bb 124->139 140 6c8185ae-6c8185b9 124->140 141 6c8185bf-6c8185c1 139->141 140->139 140->141 143 6c8185d0 141->143 144 6c8185c3-6c8185ce 141->144 146 6c8185d4-6c81866f call 6c801460 call 6c817d70 call 6c81a7b0 143->146 144->143 144->146 173 6c818671-6c818687 call 6c82663b 146->173 174 6c81868c-6c8186bf call 6c81b9c0 146->174 147->148 149 6c818949-6c8189c6 call 6c801460 call 6c810880 147->149 148->149 159 6c8189c8 149->159 160 6c8189eb-6c818a39 call 6c801400 call 6c808ab0 149->160 162 6c8189d0-6c8189e9 call 6c805290 159->162 171 6c818a3e-6c818a46 160->171 162->160 175 6c818aa3-6c818aa8 171->175 176 6c818a48 171->176 173->174 192 6c8186c1 174->192 193 6c8186c6-6c8186cb 174->193 181 6c818c55-6c818c6b call 6c82663b 175->181 182 6c818aae-6c818ab5 175->182 177 6c818a88-6c818a9e call 6c82663b 176->177 178 6c818a4a-6c818a4f 176->178 177->175 183 6c818a51-6c818a56 178->183 184 6c818a6d-6c818a83 call 6c82663b 178->184 181->52 187 6c818ac0-6c818ac6 182->187 188 6c818ab7-6c818ab9 182->188 183->182 190 6c818a58-6c818a68 call 6c82663b 183->190 184->177 195 6c818b95-6c818b97 187->195 196 6c818acc-6c818ad2 187->196 188->187 194 6c818abb 188->194 190->184 192->193 198 6c818728-6c81872d 193->198 199 6c8186cd 193->199 194->187 200 6c818bb4-6c818be5 call 6c8251d6 call 6c818f00 call 6c8251d6 195->200 201 6c818b99-6c818baf call 6c82663b 195->201 196->195 202 6c818ad8-6c818ada 196->202 203 6c818733-6c818735 198->203 204 6c8187fe-6c818814 call 6c82663b 198->204 205 6c81870d-6c818723 call 6c82663b 199->205 206 6c8186cf-6c8186d4 199->206 237 6c818be7-6c818bec 200->237 238 6c818bef-6c818c04 call 6c809990 200->238 201->200 209 6c818af7-6c818b28 call 6c8251d6 call 6c818f00 call 6c8251d6 202->209 210 6c818adc-6c818af2 call 6c82663b 202->210 212 6c818752-6c818759 203->212 213 6c818737-6c81874d call 6c82663b 203->213 204->65 205->198 215 6c8186f2-6c818708 call 6c82663b 206->215 216 6c8186d6-6c8186db 206->216 209->94 242 6c818b2a-6c818b2f 209->242 210->209 222 6c81875b-6c81875d 212->222 223 6c81875f 212->223 213->212 215->205 216->203 224 6c8186dd-6c8186ed call 6c82663b 216->224 222->223 228 6c818764-6c8187fd call 6c8251d6 * 3 call 6c818270 call 6c8251d6 call 6c809990 call 6c80fc00 call 6c818de0 call 6c804c80 222->228 223->228 224->215 237->238 246 6c818c06-6c818c09 238->246 247 6c818c0e-6c818c54 call 6c80fc00 call 6c818de0 call 6c804c80 238->247 242->94 246->247
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8184B2
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818687
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8186ED
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818708
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818723
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81874D
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81882F
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818A68
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818A83
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818A9E
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818AF2
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818324
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818390
                                                          • _malloc.LIBCMT ref: 6C8183B1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8183CB
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818416
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818468
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818CE4
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818CF9
                                                          • __CxxThrowException@8.LIBCMT ref: 6C818D14
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise_malloc
                                                          • String ID: 7zCon.sfx
                                                          • API String ID: 1305767944-1084822657
                                                          • Opcode ID: 633abfe90275a623c0baf7c8e7f48f574b6d4a2d1cc104ef8fca83d5f30e5044
                                                          • Instruction ID: f48928cffa0cebe1f65bba0a41dccf787cc0cb06c50c0fa7f2d25e5e5aa71de9
                                                          • Opcode Fuzzy Hash: 633abfe90275a623c0baf7c8e7f48f574b6d4a2d1cc104ef8fca83d5f30e5044
                                                          • Instruction Fuzzy Hash: 4662AF71904259DBCB21CBA8CE80BDDB7F8AF48308F1489DAD148A7B41DB745B89CF91
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 1000485E
                                                            • Part of subcall function 100081EF: __EH_prolog.LIBCMT ref: 100081F4
                                                            • Part of subcall function 10017690: InitializeCriticalSection.KERNEL32 ref: 100176BE
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 10004A99
                                                          • SysFreeString.OLEAUT32(?), ref: 10004D73
                                                          • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004E67
                                                          • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004ED2
                                                          • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004F2E
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 10005080
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 100050D7
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 10005131
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 1000519C
                                                          • SysFreeString.OLEAUT32(?), ref: 100051C5
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 10005201
                                                          • SysFreeString.OLEAUT32(?), ref: 10005238
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 10005274
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 100052EC
                                                          • DeleteCriticalSection.KERNEL32(?), ref: 1000537C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Delete$FreeString$H_prolog$Initialize
                                                          • String ID: *
                                                          • API String ID: 3004459923-163128923
                                                          • Opcode ID: a2fd4f51cf098088f1d673df1d5e7e4f5325e63a52518889363f111df623ee90
                                                          • Instruction ID: ecb8a8915c69c7c96d6c908040f4422d87eeaffb21051c4ea884642e96cadca4
                                                          • Opcode Fuzzy Hash: a2fd4f51cf098088f1d673df1d5e7e4f5325e63a52518889363f111df623ee90
                                                          • Instruction Fuzzy Hash: C3926B74900289DFEF04CFA4C884ADDBBB5FF19344F21849CE446AB256CB71AA89CF51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1649 6c823ef0-6c823fb6 call 6c824b70 call 6c804a90 call 6c805bf0 call 6c8251d6 * 2 call 6c824c50 call 6c807630 call 6c8015c0 call 6c8251d6 * 2 1670 6c823fc3-6c823fc8 1649->1670 1671 6c823fb8-6c823fbd 1649->1671 1673 6c824185-6c82418a 1670->1673 1674 6c823fce-6c823fd3 1670->1674 1671->1670 1672 6c824072-6c824076 1671->1672 1679 6c8240d3-6c8240e1 call 6c8251d6 1672->1679 1680 6c824078-6c82407c 1672->1680 1677 6c824190-6c824195 1673->1677 1678 6c8242cb-6c8242d0 1673->1678 1675 6c8240e6-6c8240eb 1674->1675 1676 6c823fd9-6c824065 call 6c824b70 call 6c824c50 call 6c807630 call 6c807ee0 call 6c805bf0 call 6c8015c0 call 6c8251d6 * 4 1674->1676 1675->1673 1687 6c8240f1-6c82417c call 6c824b70 call 6c824c50 call 6c807630 call 6c807ee0 call 6c805bf0 call 6c8015c0 call 6c8251d6 * 4 1675->1687 1819 6c82417d-6c824182 call 6c8251d6 1676->1819 1684 6c82419b-6c824227 call 6c824b70 call 6c824c50 call 6c807630 call 6c807ee0 call 6c805bf0 call 6c8015c0 call 6c8251d6 * 4 1677->1684 1685 6c82422c-6c824231 1677->1685 1682 6c8242d2-6c8242d4 1678->1682 1683 6c82432c-6c824338 call 6c825f2a 1678->1683 1703 6c824400-6c824414 1679->1703 1680->1679 1688 6c82407e-6c8240cc call 6c824b70 call 6c807630 call 6c8015c0 call 6c8251d6 * 2 1680->1688 1691 6c8242d7-6c8242e0 1682->1691 1708 6c82433a-6c824348 call 6c82663b 1683->1708 1709 6c82434d-6c824379 call 6c821230 call 6c8182b0 1683->1709 1823 6c8242c3-6c8242c8 call 6c8251d6 1684->1823 1685->1678 1694 6c824237-6c8242c2 call 6c824b70 call 6c824c50 call 6c807630 call 6c807ee0 call 6c805bf0 call 6c8015c0 call 6c8251d6 * 4 1685->1694 1687->1819 1772 6c824070 1688->1772 1773 6c8240ce 1688->1773 1691->1691 1701 6c8242e2-6c8242e6 1691->1701 1694->1823 1701->1683 1711 6c8242e8-6c824329 call 6c824b70 call 6c807630 call 6c8015c0 call 6c8251d6 * 2 1701->1711 1708->1709 1738 6c82437e-6c8243c9 call 6c821a40 1709->1738 1711->1683 1756 6c8243f4-6c8243fd call 6c8251d6 1738->1756 1757 6c8243cb-6c8243ce 1738->1757 1756->1703 1764 6c8243d0 call 6c825bd8 1757->1764 1765 6c8243d5-6c8243d9 1757->1765 1764->1765 1778 6c824417-6c824419 1765->1778 1779 6c8243db call 6c825bd8 1765->1779 1772->1672 1773->1670 1789 6c8243e0-6c8243e3 1778->1789 1779->1789 1792 6c8243e5 call 6c825bd8 1789->1792 1793 6c8243ea-6c8243f2 1789->1793 1792->1793 1793->1756 1819->1673 1823->1678
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: -i$ -p$ -x$!$7za L
                                                          • API String ID: 0-2873427068
                                                          • Opcode ID: 9b7dc312d49eb1745b279a003fbe38f15082487e832392588ad7fcbafc6df0d5
                                                          • Instruction ID: 9e65fdd7a791d90629c1850bd1b038dcca13e7db10eb65862eeaf04570ac7847
                                                          • Opcode Fuzzy Hash: 9b7dc312d49eb1745b279a003fbe38f15082487e832392588ad7fcbafc6df0d5
                                                          • Instruction Fuzzy Hash: BFF19872901348EBCB24DBE8CE44ACEB7B8AF54308F244D69E5056B745D7789A48CBF1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1827 6c8042e0-6c804319 1828 6c804325-6c80433c call 6c8026e0 1827->1828 1829 6c80431b-6c804320 call 6c802670 1827->1829 1833 6c804348-6c80436a 1828->1833 1834 6c80433e-6c804343 call 6c802670 1828->1834 1829->1828 1836 6c80436c-6c804378 1833->1836 1837 6c80437e-6c804387 1833->1837 1834->1833 1836->1837 1838 6c8043a4 1837->1838 1839 6c804389-6c804392 1837->1839 1842 6c8043a9-6c8043e1 call 6c803cf0 * 2 1838->1842 1840 6c804394-6c804397 1839->1840 1841 6c80439d-6c8043a2 1839->1841 1840->1838 1843 6c804399-6c80439b 1840->1843 1841->1842 1848 6c804402-6c80440c 1842->1848 1849 6c8043e3-6c8043ff call 6c802d80 1842->1849 1843->1842 1851 6c804428-6c80443b 1848->1851 1852 6c80440e-6c804425 call 6c802d80 1848->1852 1849->1848 1854 6c80443d-6c804443 1851->1854 1855 6c80444e 1851->1855 1852->1851 1854->1855 1858 6c804445-6c80444c 1854->1858 1859 6c804453-6c80445c 1855->1859 1858->1855 1858->1859 1860 6c804462 1859->1860 1861 6c80452b-6c804533 1859->1861 1862 6c804466-6c80446e 1860->1862 1861->1862 1863 6c804539 1861->1863 1864 6c804474 1862->1864 1865 6c80453e-6c804543 1862->1865 1863->1865 1866 6c804479-6c804498 call 6c802940 1864->1866 1865->1866 1867 6c804549-6c80454d 1865->1867 1872 6c80449d-6c8044ba 1866->1872 1869 6c804559-6c804573 call 6c801460 1867->1869 1870 6c80454f-6c804554 call 6c802670 1867->1870 1869->1866 1879 6c804579-6c80457e call 6c802670 1869->1879 1870->1869 1875 6c8044d3-6c8044e9 1872->1875 1876 6c8044bc-6c8044cf call 6c801460 1872->1876 1877 6c804504-6c804509 1875->1877 1878 6c8044eb-6c804500 call 6c801460 1875->1878 1876->1875 1883 6c804738-6c80473d 1877->1883 1884 6c80450f-6c804513 1877->1884 1878->1877 1887 6c804583-6c8045ad 1879->1887 1888 6c80474d-6c804779 call 6c803750 call 6c8039a0 1883->1888 1889 6c80473f-6c804742 1883->1889 1890 6c804521-6c804526 call 6c802670 1884->1890 1891 6c804515-6c80451f 1884->1891 1892 6c8045cb-6c8045d5 1887->1892 1893 6c8045af-6c8045c8 call 6c802d80 1887->1893 1919 6c804782-6c804794 1888->1919 1920 6c80477b 1888->1920 1889->1888 1894 6c804744-6c804747 1889->1894 1890->1861 1891->1887 1891->1890 1899 6c8045f4-6c8045f9 1892->1899 1900 6c8045d7-6c8045f1 call 6c802d80 1892->1900 1893->1892 1894->1888 1898 6c8048a6-6c8048a9 1894->1898 1905 6c804a62-6c804a65 1898->1905 1906 6c8048af-6c8048dd 1898->1906 1907 6c8045fb-6c804608 call 6c81e950 1899->1907 1908 6c80460d-6c804621 call 6c803250 call 6c81ed50 1899->1908 1900->1899 1905->1829 1910 6c804a6b-6c804a86 call 6c81ed50 1905->1910 1913 6c804903-6c804915 1906->1913 1914 6c8048df-6c8048f7 call 6c803e30 1906->1914 1907->1908 1938 6c804623-6c80466d call 6c801420 call 6c804d10 * 2 call 6c8251d6 1908->1938 1939 6c80466f-6c80467b call 6c803e70 1908->1939 1913->1910 1917 6c80491b 1913->1917 1914->1913 1930 6c8048f9-6c8048fe call 6c802670 1914->1930 1923 6c804920-6c80494e call 6c801420 CharUpperW 1917->1923 1925 6c8047b4-6c8047c5 1919->1925 1926 6c804796-6c80479b 1919->1926 1920->1919 1923->1829 1944 6c804954-6c80495b 1923->1944 1933 6c8047c7-6c8047e9 call 6c801460 1925->1933 1934 6c804819 1925->1934 1928 6c8047a7-6c8047ab 1926->1928 1929 6c80479d-6c8047a1 1926->1929 1928->1925 1936 6c8047ad 1928->1936 1935 6c8047a3-6c8047a5 1929->1935 1929->1936 1930->1913 1933->1934 1954 6c8047eb-6c8047fd 1933->1954 1942 6c80481d-6c804838 1934->1942 1935->1925 1935->1928 1936->1925 1959 6c804686-6c80468b 1938->1959 1955 6c804680-6c804683 1939->1955 1947 6c80483a-6c804841 1942->1947 1948 6c80487b-6c80487d 1942->1948 1952 6c8049a6-6c8049aa 1944->1952 1953 6c80495d-6c804967 1944->1953 1956 6c804843-6c804855 call 6c82663b 1947->1956 1957 6c80485a-6c80485c 1947->1957 1950 6c804898-6c8048a1 call 6c803250 1948->1950 1951 6c80487f-6c804893 call 6c801460 1948->1951 1950->1910 1951->1950 1952->1829 1958 6c8049b0-6c8049b8 1952->1958 1965 6c804969 1953->1965 1966 6c80496e-6c804981 call 6c803e30 1953->1966 1954->1942 1967 6c8047ff-6c804817 call 6c804b20 1954->1967 1955->1959 1956->1957 1957->1948 1961 6c80485e-6c804862 1957->1961 1968 6c8049ba-6c8049c4 1958->1968 1969 6c8049ed-6c8049f1 1958->1969 1970 6c804721-6c804733 call 6c805110 1959->1970 1971 6c804691-6c8046a2 call 6c8039a0 1959->1971 1961->1948 1972 6c804864-6c804876 call 6c82663b 1961->1972 1965->1966 1966->1829 1992 6c804987-6c80498e 1966->1992 1967->1942 1977 6c8049c6 1968->1977 1978 6c8049cb-6c8049d3 1968->1978 1969->1829 1982 6c8049f7-6c8049fc 1969->1982 1970->1910 1994 6c8046a4-6c8046a8 1971->1994 1995 6c8046c7-6c8046d1 1971->1995 1972->1948 1977->1978 1987 6c804a34-6c804a5a call 6c8251d6 1978->1987 1988 6c8049d5-6c8049e5 call 6c803e30 1978->1988 1982->1987 1990 6c8049fe-6c804a31 call 6c801640 call 6c801460 call 6c8251d6 1982->1990 1987->1923 2007 6c804a60 1987->2007 1988->1829 2009 6c8049eb 1988->2009 1990->1987 1992->1829 1999 6c804994-6c8049a1 1992->1999 1994->1995 2001 6c8046aa-6c8046ae 1994->2001 2003 6c8046d3-6c8046ec call 6c801460 call 6c812cb0 1995->2003 2004 6c8046ef-6c804700 1995->2004 1999->1987 2001->1995 2008 6c8046b0-6c8046c2 call 6c82663b 2001->2008 2003->2004 2012 6c804702-6c804712 2004->2012 2013 6c804714-6c804718 2004->2013 2007->1910 2008->1995 2009->1987 2012->1970 2013->1970 2014 6c80471a 2013->2014 2014->1970
                                                          APIs
                                                            • Part of subcall function 6C802670: __CxxThrowException@8.LIBCMT ref: 6C802688
                                                            • Part of subcall function 6C804D10: _malloc.LIBCMT ref: 6C804D3A
                                                            • Part of subcall function 6C804D10: __CxxThrowException@8.LIBCMT ref: 6C804D54
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8046C2
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • __CxxThrowException@8.LIBCMT ref: 6C804855
                                                          • __CxxThrowException@8.LIBCMT ref: 6C804876
                                                          • CharUpperW.USER32(?), ref: 6C804943
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$CharExceptionRaiseUpper_malloc
                                                          • String ID: Cannot use absolute pathnames for this command$Incorrect command line
                                                          • API String ID: 2609558216-724315024
                                                          • Opcode ID: b36ded6b1f205dac60757fffe3b92e88e79953df0f04f5e737e0f295273bd74f
                                                          • Instruction ID: 7ff70df6dc49c75f6e052210e3c6af5a0fdd2e220f671b504a840577cc55596e
                                                          • Opcode Fuzzy Hash: b36ded6b1f205dac60757fffe3b92e88e79953df0f04f5e737e0f295273bd74f
                                                          • Instruction Fuzzy Hash: CC22C5716087409FD721CF18CA84B96BBE1AFD530CF188D6CE4994BB52C375E949CBA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2194 1001a421-1001a42b 2195 1001a493-1001a496 2194->2195 2196 1001a42d-1001a43d 2194->2196 2197 1001a498-1001a49d 2195->2197 2198 1001a4ba-1001a4c8 HeapDestroy 2195->2198 2199 1001a47f-1001a491 HeapFree 2196->2199 2200 1001a43f-1001a44a 2196->2200 2201 1001a49f-1001a4a4 2197->2201 2199->2198 2202 1001a44d-1001a47d VirtualFree * 2 HeapFree 2200->2202 2203 1001a4b4-1001a4b8 2201->2203 2204 1001a4a6-1001a4ae VirtualFree 2201->2204 2202->2199 2202->2202 2203->2198 2203->2201 2204->2203
                                                          APIs
                                                          • VirtualFree.KERNEL32(?,00100000,00004000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A459
                                                          • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A464
                                                          • HeapFree.KERNEL32(00000000,?,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A471
                                                          • HeapFree.KERNEL32(00000000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A48D
                                                          • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000,?,?,10019FC1,1001A015,?,?,?), ref: 1001A4AE
                                                          • HeapDestroy.KERNELBASE(?,?,10019FC1,1001A015,?,?,?), ref: 1001A4C0
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Free$HeapVirtual$Destroy
                                                          • String ID:
                                                          • API String ID: 716807051-0
                                                          • Opcode ID: a134391120f2aacd7473546f5f7e68fbc99744a2b02380d7265d2bcfbbc009a3
                                                          • Instruction ID: 1c740d521b0f7e213dbb02f6402200852ca7cbed31c7f2444751ff5461a08e8a
                                                          • Opcode Fuzzy Hash: a134391120f2aacd7473546f5f7e68fbc99744a2b02380d7265d2bcfbbc009a3
                                                          • Instruction Fuzzy Hash: 5A110035240365BBE661EB10DCCAF05B7A6E785750F314026FA456A571C7B2BCA2CB14

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2205 6c8169e0-6c816a0d 2206 6c816a0f-6c816a20 LoadLibraryExW 2205->2206 2207 6c816a3e-6c816a78 call 6c817750 2205->2207 2208 6c816a22-6c816a34 2206->2208 2209 6c816a37-6c816a38 FreeLibrary 2206->2209 2212 6c816af6-6c816b02 2207->2212 2213 6c816a7a-6c816a81 2207->2213 2209->2207 2216 6c816b06-6c816b19 2212->2216 2214 6c816a83-6c816a8c FreeLibrary 2213->2214 2215 6c816a97-6c816ab3 GetProcAddress 2213->2215 2214->2215 2217 6c816a8e-6c816a91 2214->2217 2218 6c816ab5-6c816aba call 6c815f50 2215->2218 2219 6c816ae9-6c816af4 2215->2219 2217->2215 2221 6c816abf-6c816aca 2218->2221 2219->2212 2219->2216 2221->2219 2222 6c816acc-6c816add call 6c816530 2221->2222 2225 6c816ae7 2222->2225 2226 6c816adf-6c816ae5 2222->2226 2225->2219 2226->2219 2226->2225
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,0FD3DAC1,6C83FCC8,00000000), ref: 6C816A18
                                                          • FreeLibrary.KERNEL32(00000000), ref: 6C816A38
                                                          • FreeLibrary.KERNEL32(00000000,0FD3DAC1,6C83FCC8,00000000), ref: 6C816A84
                                                          • GetProcAddress.KERNEL32(?,CreateObject), ref: 6C816AA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$AddressLoadProc
                                                          • String ID: CreateObject
                                                          • API String ID: 1386263645-166191583
                                                          • Opcode ID: ef90c56c70a931bd39c4ee3d2586264bb820e562db06625444b204fd2df53bee
                                                          • Instruction ID: 7ad2dd3dc2a6153a6b399a1c83a506d890a2a641faa1cbaa836d691c56ec4b20
                                                          • Opcode Fuzzy Hash: ef90c56c70a931bd39c4ee3d2586264bb820e562db06625444b204fd2df53bee
                                                          • Instruction Fuzzy Hash: DC416F75A44606EFDB20CF65C580BAEBBF5FB49314F10892AE859D7B80D734E941CB90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2227 6c80c2d0-6c80c30f 2228 6c80c351-6c80c35f call 6c825f2a 2227->2228 2229 6c80c311-6c80c31f call 6c825f2a 2227->2229 2236 6c80c361-6c80c36f call 6c82663b 2228->2236 2237 6c80c374-6c80c3b3 call 6c812a70 2228->2237 2234 6c80c321-6c80c32f call 6c82663b 2229->2234 2235 6c80c334-6c80c34c 2229->2235 2234->2235 2242 6c80c3d7-6c80c3eb call 6c80ae70 2235->2242 2236->2237 2245 6c80c3b8-6c80c3ba 2237->2245 2246 6c80c3f0-6c80c3f8 2242->2246 2247 6c80c3d5 2245->2247 2248 6c80c3bc-6c80c3d3 GetLastError 2245->2248 2249 6c80c402-6c80c40b 2246->2249 2250 6c80c3fa-6c80c3ff 2246->2250 2247->2242 2252 6c80c415-6c80c428 2248->2252 2249->2252 2253 6c80c40d-6c80c412 2249->2253 2250->2249 2253->2252
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80C32F
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • _malloc.LIBCMT ref: 6C80C313
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • _malloc.LIBCMT ref: 6C80C353
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80C36F
                                                          • GetLastError.KERNEL32(6C834C28,80000000,00000001,00000003), ref: 6C80C3BC
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw_malloc$AllocateErrorExceptionHeapLastRaise
                                                          • String ID:
                                                          • API String ID: 2571202727-0
                                                          • Opcode ID: f0b171bcf3b5de6361a0b27f34ca58879648198f2226e38080b79a046571d61d
                                                          • Instruction ID: eb54ff1971d28209a139f9201cf9a4b4bf2b1bddd2595b33ee0c0fdb92c895bb
                                                          • Opcode Fuzzy Hash: f0b171bcf3b5de6361a0b27f34ca58879648198f2226e38080b79a046571d61d
                                                          • Instruction Fuzzy Hash: E541D372600715AFCB20DF98CA80B9BB7E8BF89314F118A2DE95897781D774D906C7E1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2254 6c815f50-6c815f8a GetProcAddress 2255 6c815f90-6c815fa3 GetProcAddress 2254->2255 2256 6c81601a 2254->2256 2258 6c815fa5-6c815fad 2255->2258 2259 6c815faf-6c815fb4 2255->2259 2257 6c81601c-6c81602c call 6c8251c7 2256->2257 2258->2257 2258->2259 2259->2256 2260 6c815fb6 2259->2260 2263 6c815fc0-6c815fc3 2260->2263 2264 6c815fc6-6c815fe7 call 6c815e80 2260->2264 2263->2264 2264->2257 2268 6c815fe9-6c816003 call 6c815e80 2264->2268 2268->2257 2271 6c816005-6c81600f call 6c8177e0 2268->2271 2273 6c816014-6c816018 2271->2273 2273->2256 2273->2263
                                                          APIs
                                                          • GetProcAddress.KERNEL32(00000000,GetMethodProperty), ref: 6C815F83
                                                          • GetProcAddress.KERNEL32(00000000,GetNumberOfMethods), ref: 6C815F9F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AddressProc
                                                          • String ID: GetMethodProperty$GetNumberOfMethods
                                                          • API String ID: 190572456-2134343882
                                                          • Opcode ID: 3a5409093bf3de9a96a6ab38a0ef8185bc4a8ad4c388ff932d950d7db7e7f4fe
                                                          • Instruction ID: eceb92fa0d58248d415a8a3b70cee5fc8c6e04aede4b1606d7d3aecef4102b60
                                                          • Opcode Fuzzy Hash: 3a5409093bf3de9a96a6ab38a0ef8185bc4a8ad4c388ff932d950d7db7e7f4fe
                                                          • Instruction Fuzzy Hash: 8A212F75E0531AEBCB10DF99DA809DEB7F9FF48308B144825E814A7B01E735E906CBA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2815 6c808670-6c8086c9 2816 6c808857-6c808881 2815->2816 2817 6c8086cf-6c8086df 2815->2817 2818 6c808883-6c80888d call 6c801680 2816->2818 2819 6c80888f-6c808892 2816->2819 2823 6c8086e1-6c808701 2817->2823 2824 6c808706-6c80870b 2817->2824 2818->2819 2822 6c808895-6c8088a4 2819->2822 2822->2822 2826 6c8088a6-6c808904 call 6c804a90 call 6c80a5c0 call 6c8099d0 call 6c8251d6 * 2 2822->2826 2835 6c808a91-6c808a96 call 6c8251d6 2823->2835 2827 6c8087d0-6c8087d3 2824->2827 2828 6c808711-6c808757 call 6c82514c call 6c80abe0 2824->2828 2863 6c808931-6c80897c call 6c805e10 call 6c80d1b0 2826->2863 2864 6c808906-6c80890a call 6c811420 2826->2864 2827->2816 2833 6c8087d9-6c80881e call 6c8251d6 2827->2833 2845 6c80875d-6c808773 call 6c80ab10 2828->2845 2846 6c80881f-6c808852 call 6c8251d6 * 2 2828->2846 2847 6c808a98-6c808aac 2835->2847 2845->2846 2858 6c808779-6c808799 call 6c81e6e0 2845->2858 2846->2847 2866 6c8087a0-6c8087a7 2858->2866 2867 6c80879b-6c80879e 2858->2867 2883 6c8089c3-6c8089c6 2863->2883 2884 6c80897e-6c8089be call 6c8251d6 call 6c804c80 call 6c8251d6 2863->2884 2874 6c80890f-6c808914 2864->2874 2873 6c8087b9-6c8087c7 call 6c8251d6 2866->2873 2867->2866 2872 6c8087a9-6c8087b8 call 6c809d00 2867->2872 2872->2873 2873->2828 2885 6c8087cd 2873->2885 2874->2863 2878 6c808916-6c80892c GetLastError call 6c82663b 2874->2878 2878->2863 2887 6c8089d4 2883->2887 2888 6c8089c8-6c8089cb 2883->2888 2884->2847 2885->2827 2889 6c8089d6-6c8089df 2887->2889 2888->2887 2891 6c8089cd-6c8089d2 2888->2891 2892 6c8089e1-6c808a0c 2889->2892 2893 6c808a3c-6c808a47 2889->2893 2891->2889 2903 6c808a2e-6c808a3a call 6c812e40 2892->2903 2904 6c808a0e-6c808a16 2892->2904 2917 6c808a48 call 10005aa5 2893->2917 2918 6c808a48 call 100061aa 2893->2918 2896 6c808a4a 2898 6c808a4c-6c808a90 call 6c8251d6 call 6c804c80 2896->2898 2898->2835 2903->2898 2907 6c808a18-6c808a1c 2904->2907 2908 6c808a1e-6c808a2b call 6c812f70 2904->2908 2907->2903 2907->2908 2908->2903 2917->2896 2918->2896
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00000000,?,00000000), ref: 6C808916
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80892C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorException@8LastThrow
                                                          • String ID: <H
                                                          • API String ID: 1006195485-4022674625
                                                          • Opcode ID: f3ed87fadf67701d13387c1dd89147e3a96fcf9ef3ef0f5fa34d96556853512b
                                                          • Instruction ID: 3d3810382d99367cc3fb8eb85948fe9dd19bf53b97db9c2af21e51e7abdb3517
                                                          • Opcode Fuzzy Hash: f3ed87fadf67701d13387c1dd89147e3a96fcf9ef3ef0f5fa34d96556853512b
                                                          • Instruction Fuzzy Hash: 79E1B3B1A012499FCB10DFE8CE909DEBBB4BF48304F14852DE515AB744D735AA49CBA1

                                                          Control-flow Graph

                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C80CB18
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80CB30
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                            • Part of subcall function 6C80A910: __CxxThrowException@8.LIBCMT ref: 6C80A992
                                                          • GetLastError.KERNEL32(?,00000000,00000000), ref: 6C80CBD3
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AllocateErrorExceptionHeapLastRaise_malloc
                                                          • String ID:
                                                          • API String ID: 214124409-0
                                                          • Opcode ID: b91272557a35babb7e587abba0f8339daf968b4f05acc863afb897d1c6f4a93f
                                                          • Instruction ID: eb90ac0de1b4bf9fa064fe2e9d91968199230a2b8d40ef25bb81494dbb4503c5
                                                          • Opcode Fuzzy Hash: b91272557a35babb7e587abba0f8339daf968b4f05acc863afb897d1c6f4a93f
                                                          • Instruction Fuzzy Hash: D6A184B1E00208AFCB14DFACDD80ADEB7B4BF48218F104629E915A7741D734AA19CBA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2995 6c812a70-6c812a9c 2996 6c812ab3-6c812ad7 CreateFileW 2995->2996 2997 6c812a9e-6c812aa7 CloseHandle 2995->2997 3000 6c812ad9-6c812b08 call 6c801680 call 6c8128a0 2996->3000 3001 6c812b3c-6c812b54 2996->3001 2998 6c812b57-6c812b69 2997->2998 2999 6c812aad 2997->2999 2999->2996 3006 6c812b33-6c812b39 call 6c8251d6 3000->3006 3007 6c812b0a-6c812b13 3000->3007 3006->3001 3007->3006 3008 6c812b15-6c812b31 CreateFileW 3007->3008 3008->3006
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,0FD3DAC1,?,00000000,?,?,00000000,?,?,?,00000000,6C830C38,000000FF), ref: 6C812A9F
                                                          • CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,0FD3DAC1,?,00000000,?,?,00000000), ref: 6C812ACC
                                                          • CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6C812B2B
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateFile$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1443461169-0
                                                          • Opcode ID: e94226f0b88171cd55a24920e0ef924f3f6f1fb58f2e0d74f314d73ea984fe55
                                                          • Instruction ID: 08d765133abbe156b18d5c9ac0b36574bad84f1b13c254e47bf5339ca63b47ad
                                                          • Opcode Fuzzy Hash: e94226f0b88171cd55a24920e0ef924f3f6f1fb58f2e0d74f314d73ea984fe55
                                                          • Instruction Fuzzy Hash: 4F318F71A0521AAFDB20CF54C945BABB7B8EB05724F204B19F82597780D734AA15CBA0
                                                          APIs
                                                          • CreateDirectoryW.KERNEL32(?,00000000,0FD3DAC1,?,?,?,?,?,00000000), ref: 6C81136E
                                                          • GetLastError.KERNEL32 ref: 6C81138C
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 6C8113D7
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$ErrorLast
                                                          • String ID:
                                                          • API String ID: 2485089472-0
                                                          • Opcode ID: 96b55329e54c0b3689b4b4ccc482e4e55f360dbd208c3ae04439fcda6342a3f1
                                                          • Instruction ID: 80b826d540dc0177a6e20c66570e8ec38028d37af9c2f8ca6cd564ef7722b3d7
                                                          • Opcode Fuzzy Hash: 96b55329e54c0b3689b4b4ccc482e4e55f360dbd208c3ae04439fcda6342a3f1
                                                          • Instruction Fuzzy Hash: 6121C173E082159BDB208F99D9057EFBBB9EB45628F10097AED0893B40DB3A9905C7D1
                                                          APIs
                                                          • SetFilePointer.KERNEL32(?,?,?,?), ref: 6C801AEC
                                                          • GetLastError.KERNEL32 ref: 6C801B01
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastPointer
                                                          • String ID:
                                                          • API String ID: 2976181284-0
                                                          • Opcode ID: 78c548104145cbc248671c8147aabadc660c0ea870018f2af8e7d28e3a87c7e2
                                                          • Instruction ID: 21fc9458c62ab832fe4d042677d83883ce6e569a1cf7aed68473a0645822b3f4
                                                          • Opcode Fuzzy Hash: 78c548104145cbc248671c8147aabadc660c0ea870018f2af8e7d28e3a87c7e2
                                                          • Instruction Fuzzy Hash: 2F1106737052095B8320CE6CED509AAB7E4EB85338F108A2EFD18C7650E332D41597E1
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10008A6A
                                                            • Part of subcall function 1000A4D5: __EH_prolog.LIBCMT ref: 1000A4DA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-3916222277
                                                          • Opcode ID: e5ab11678a7af806c47a763770102e730e2bdbd4d0fd60aadb5155847553715b
                                                          • Instruction ID: 5679c1a6151dc724afce86c3166b852d76cd262a1264ab291975f652ea8321e5
                                                          • Opcode Fuzzy Hash: e5ab11678a7af806c47a763770102e730e2bdbd4d0fd60aadb5155847553715b
                                                          • Instruction Fuzzy Hash: E3717F74E00609DFEB04DFA4C981AADB7F1FF44390F104519E495AB39ADB34AB81CBA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-3916222277
                                                          • Opcode ID: 87f4fbd9ed9835f185afa277318771e429ef2e1cba041ba48d785ab7c3d46741
                                                          • Instruction ID: dc996c4eb68a87c8f199726ed84f9ce0c47e74a02a5fa25993d790b30f922306
                                                          • Opcode Fuzzy Hash: 87f4fbd9ed9835f185afa277318771e429ef2e1cba041ba48d785ab7c3d46741
                                                          • Instruction Fuzzy Hash: B4515275E002069FEB14DFA8C881ABEB7F5FF88380F548529E545E7245DB70AE41CB61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Empty file path
                                                          • API String ID: 0-1562447899
                                                          • Opcode ID: 48b8cf2dcb04ff378a2b35c090c8960991f91fd3907fde3838b8dd5341727f1e
                                                          • Instruction ID: 4f93d5f53a7a265421157330b36987e181ed787458858d8829baaf16c3cd5eaf
                                                          • Opcode Fuzzy Hash: 48b8cf2dcb04ff378a2b35c090c8960991f91fd3907fde3838b8dd5341727f1e
                                                          • Instruction Fuzzy Hash: 7441C671A042599BCB20CF9CCE85BEEB7B5FB44324F108E69E82457B80D7B9A945C7D0
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C804042
                                                            • Part of subcall function 6C804D10: _malloc.LIBCMT ref: 6C804D3A
                                                            • Part of subcall function 6C804D10: __CxxThrowException@8.LIBCMT ref: 6C804D54
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8041B5
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$_malloc
                                                          • String ID:
                                                          • API String ID: 175252994-0
                                                          • Opcode ID: 63ff22c86d4ebd8b27eba1522c8a1f17b520a28c26e40a075f6c6f74f3a1ab12
                                                          • Instruction ID: 781b6978f8afdb93c6ce411b5b3148fe755d736261a7279a2900598505aebbeb
                                                          • Opcode Fuzzy Hash: 63ff22c86d4ebd8b27eba1522c8a1f17b520a28c26e40a075f6c6f74f3a1ab12
                                                          • Instruction Fuzzy Hash: BDB112B1D01229DBDB20CF99CA80ADEFBB4BF58304F6085AEE509A7740D7345A49CF91
                                                          APIs
                                                          • SetFileAttributesW.KERNEL32(00000000,00000000,0FD3DAC1,?,00000000,?,?,00000000,?,0FD3DAC1,00000000), ref: 6C81108F
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 6C8110ED
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 9335a77383c69ca6e999874edd2edf8d6d940426d972b844beee8686a6a8ef38
                                                          • Instruction ID: 3daaff440db1ff1f00ae594b8482f1efe1bfd89ae6c24d75d3044e135c0ba010
                                                          • Opcode Fuzzy Hash: 9335a77383c69ca6e999874edd2edf8d6d940426d972b844beee8686a6a8ef38
                                                          • Instruction Fuzzy Hash: EC218372E042099BDB20CF98D905BDEF7B8EB45668F10057AE91893740EB359905C7D1
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C805A9E
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C805ABA
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2732643326-0
                                                          • Opcode ID: 30f686934325ddfd26e293bc6b2e7451ff8ef06855df100146c1db00d02bd8b4
                                                          • Instruction ID: ddaa014c87498fbf93b2143c987a52b5af0b1c19192cfd9aba5eb41c86f621f9
                                                          • Opcode Fuzzy Hash: 30f686934325ddfd26e293bc6b2e7451ff8ef06855df100146c1db00d02bd8b4
                                                          • Instruction Fuzzy Hash: 3B21F571604785AFC730CFA8C990A96BBF4EB45314F008A7EE455C7B81D730A948C7A1
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C804D3A
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C804D54
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2732643326-0
                                                          • Opcode ID: 2d3e59dec54bd094129be0b5ebe1f936be5a36a3133f7a09ae4fe5345a0a793d
                                                          • Instruction ID: 4c2f2b759e4b7e9a4366f13e3fc70b71c4650ccd80ad5d8cd10b0958f9b2264e
                                                          • Opcode Fuzzy Hash: 2d3e59dec54bd094129be0b5ebe1f936be5a36a3133f7a09ae4fe5345a0a793d
                                                          • Instruction Fuzzy Hash: 3611AF71604605EFD730CF59C940B9AB7E5EB85328F008A7EE82AC7B90EB34A944C790
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C8177E6
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C817803
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2732643326-0
                                                          • Opcode ID: a16f606df15300866b63f4b74e039b1eec29145f951eda8d61ef26e522cbdf2d
                                                          • Instruction ID: c4b7077222eb07c7a859e52f6e5348b7842612ddb0c7567f9c98d26de48dd78e
                                                          • Opcode Fuzzy Hash: a16f606df15300866b63f4b74e039b1eec29145f951eda8d61ef26e522cbdf2d
                                                          • Instruction Fuzzy Hash: 8201C071504216DBDB24CF18C590996B3A5EB45308F0488AEEC05CFB01D671DD85C7E0
                                                          APIs
                                                            • Part of subcall function 1001C480: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,10019E24,10021318,000000FF,?,1001C056,00000001,00000074), ref: 1001C576
                                                          • CreateThread.KERNEL32(00000000,00000000,10019D23,00000000,?,?), ref: 10019CF9
                                                          • GetLastError.KERNEL32(?,10017589,00000000,00000000,10002FF6,00000000,00000000,00000000,?,10002FF2,?,?,?,?,10003E76,?), ref: 10019D03
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocCreateErrorHeapLastThread
                                                          • String ID:
                                                          • API String ID: 3580101977-0
                                                          • Opcode ID: 53b11fc37b3e5cb832321f1eb73cf4aff9b5aac8ba68efd3095b3517519951be
                                                          • Instruction ID: 578384fe474d0b562f95e97df9c8fae57dcf2a9e42d60c7228f8a9f52e2ea293
                                                          • Opcode Fuzzy Hash: 53b11fc37b3e5cb832321f1eb73cf4aff9b5aac8ba68efd3095b3517519951be
                                                          • Instruction Fuzzy Hash: 77F028372043156BDB21DF65EC05DAF3BA5DF446B0B104029FA18CA190CB31D8918B91
                                                          APIs
                                                          • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 6C801C4C
                                                          • GetLastError.KERNEL32 ref: 6C801C75
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastWrite
                                                          • String ID:
                                                          • API String ID: 442123175-0
                                                          • Opcode ID: dd39091074f5eaf7e26056d2f4375c6935886920d53fa7d587662a6b1fe90560
                                                          • Instruction ID: b64593ba95723408ae1eb3ae3697377c105505be17144d5b56b19472bb65a28f
                                                          • Opcode Fuzzy Hash: dd39091074f5eaf7e26056d2f4375c6935886920d53fa7d587662a6b1fe90560
                                                          • Instruction Fuzzy Hash: 1701623230170A9BD720CE58DD54BA737F8BF44718F114D2AF91ADB980D3B9E8559BA0
                                                          APIs
                                                          • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 6C8019EB
                                                          • GetLastError.KERNEL32 ref: 6C801A0C
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastRead
                                                          • String ID:
                                                          • API String ID: 1948546556-0
                                                          • Opcode ID: 00ac18cc7b90607fe8d602a37992c34e34e676b12de97c26ef4dc84fbc0ce0c6
                                                          • Instruction ID: 51e60aaef0ac504d4006014bd15fb33042c9c4b0d89959a5487d0bc96b02bfd9
                                                          • Opcode Fuzzy Hash: 00ac18cc7b90607fe8d602a37992c34e34e676b12de97c26ef4dc84fbc0ce0c6
                                                          • Instruction Fuzzy Hash: 4BF0AF7231020A9BDB20CE54DC15B6733A9BB84328F10C93AF809CB680D779D821CB60
                                                          APIs
                                                          • HeapCreate.KERNEL32(00000000,00001000,00000000,10019F1B,00000001), ref: 1001A3D5
                                                            • Part of subcall function 1001A27C: GetVersionExA.KERNEL32 ref: 1001A29B
                                                          • HeapDestroy.KERNEL32 ref: 1001A414
                                                            • Part of subcall function 1001A4C9: HeapAlloc.KERNEL32(00000000,00000140,1001A3FD,000003F8), ref: 1001A4D6
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Heap$AllocCreateDestroyVersion
                                                          • String ID:
                                                          • API String ID: 2507506473-0
                                                          • Opcode ID: bc4e9ed2508816d106b6c68f37e2140fc1a3498347a5ba50f7c2e7f5e8612b28
                                                          • Instruction ID: f49a4552e00520ddd5bd994c2c6f56530b3037705a70c7491d35245aff95e9ec
                                                          • Opcode Fuzzy Hash: bc4e9ed2508816d106b6c68f37e2140fc1a3498347a5ba50f7c2e7f5e8612b28
                                                          • Instruction Fuzzy Hash: 80F09274611302ABFF14EB309D8AB5935D1DB86791F308436F905CD0A6EBF0D8D2A611
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C8109E8
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C810A02
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrow_malloc
                                                          • String ID:
                                                          • API String ID: 2732643326-0
                                                          • Opcode ID: 38ca747052baffe1e19b7e6da4f51cd03712b0723bfd3cb3490ca642c1f9fb4a
                                                          • Instruction ID: 12f54bea9259baec2095ff4413145219a6fe209abbf44052191b2df88857fd8b
                                                          • Opcode Fuzzy Hash: 38ca747052baffe1e19b7e6da4f51cd03712b0723bfd3cb3490ca642c1f9fb4a
                                                          • Instruction Fuzzy Hash: 0DD05E9184D349728B24D7A9AE0199A7BEC8A15208F400AA6BC08C2A01FA36962D42E5
                                                          APIs
                                                          • CloseHandle.KERNEL32(00000002,6C81B356,?,?,?,?,?,?,6C835380,?), ref: 6C801BE9
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,6C835380,?), ref: 6C801BFD
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast
                                                          • String ID:
                                                          • API String ID: 918212764-0
                                                          • Opcode ID: 2c75fe9aa9719fb28a683f31690e8b07d9f0bff530f5085e06861560a0db22f4
                                                          • Instruction ID: f181e95046a0752ac3b326719b7ade1ed13a65a05d6fa9ee89f5505823f0e5a9
                                                          • Opcode Fuzzy Hash: 2c75fe9aa9719fb28a683f31690e8b07d9f0bff530f5085e06861560a0db22f4
                                                          • Instruction Fuzzy Hash: B7E01274351A036ADB304A75CE5432275A46B0173DFA08F28E07AD68E0E77CC4428A04
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 77d91d3dc47dd387f4a4c0ba6b5aa2c283876a1cf57c9fbbaea89970380046ef
                                                          • Instruction ID: 24b6dd137383e7686c229cdd86bb12439a3ed7e02ed9f8727553bb3e51178dae
                                                          • Opcode Fuzzy Hash: 77d91d3dc47dd387f4a4c0ba6b5aa2c283876a1cf57c9fbbaea89970380046ef
                                                          • Instruction Fuzzy Hash: 37427F74904249DFEB00CFA4C984BDDBBF5EF09384F244099E849AB386DB75AE45CB61
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10009829
                                                            • Part of subcall function 1000940A: __EH_prolog.LIBCMT ref: 1000940F
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 20f936d777ea9103e340114ca1ee5d19f73f9782134bda5456cca3b6a12e0127
                                                          • Instruction ID: 7486e4567ea8ddc6047f59b84a49b8006f4fb568e8041e622ffbf8bfe16b7337
                                                          • Opcode Fuzzy Hash: 20f936d777ea9103e340114ca1ee5d19f73f9782134bda5456cca3b6a12e0127
                                                          • Instruction Fuzzy Hash: FE326A74904249DFEB14CFA4C880BDEBBB5FF45384F50806EE44AA7296DB70AA85CF51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: dc746a499187cff85fc7484ade5f2022362ea269692349762d9b171528c868e0
                                                          • Instruction ID: 16904ee073535d8266284e3ab4d1ee50d97a619b8a40ccf019ff2181d9a9fe66
                                                          • Opcode Fuzzy Hash: dc746a499187cff85fc7484ade5f2022362ea269692349762d9b171528c868e0
                                                          • Instruction Fuzzy Hash: 4DC17F74A0024ADFEB14CFA8C884BDEBBF1FF49380F204629E445A7245DB75AE81CB51
                                                          APIs
                                                          • SetFileTime.KERNEL32(?,00000000,00000000,00000000,0FD3DAC1,?,?,?,?,?,6C830300,000000FF), ref: 6C807438
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FileTime
                                                          • String ID:
                                                          • API String ID: 1425588814-0
                                                          • Opcode ID: 7aa8a9e0604a23b92ce39015107cac5231978f92e229a163064705dc761d5c5d
                                                          • Instruction ID: 9e7aab81d76019c4ddfe8f30f6fdabc5f913fc0721afc0041790947660040121
                                                          • Opcode Fuzzy Hash: 7aa8a9e0604a23b92ce39015107cac5231978f92e229a163064705dc761d5c5d
                                                          • Instruction Fuzzy Hash: 2E517E71B05E86AFD328CF74C980B96FBA0FB45218F108A6DD42D87A01D731B854DB90
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10008DE2
                                                            • Part of subcall function 1000A51C: __EH_prolog.LIBCMT ref: 1000A521
                                                            • Part of subcall function 1000809D: __EH_prolog.LIBCMT ref: 100080A2
                                                            • Part of subcall function 10008A65: __EH_prolog.LIBCMT ref: 10008A6A
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 0f2ef54e4d54980d6866c9ca524e59761326e1e766cc54546d6848b3260f56d2
                                                          • Instruction ID: 0609df34ebabf0a4a76e2918ca157b4269ad3ae51d55b8a1eb59a52bcf34417c
                                                          • Opcode Fuzzy Hash: 0f2ef54e4d54980d6866c9ca524e59761326e1e766cc54546d6848b3260f56d2
                                                          • Instruction Fuzzy Hash: DF51B274D00159DBEF14DFA4C885AEEBBB2FF44390F108159E8556B286CB71AF41CB90
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10007912
                                                            • Part of subcall function 1000A496: __EH_prolog.LIBCMT ref: 1000A49B
                                                            • Part of subcall function 10007AD6: __EH_prolog.LIBCMT ref: 10007ADB
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 6bb2def5445f3f3c03a7c343a9c0ad1c6318bdf414d74d1a9ec3108368a0102b
                                                          • Instruction ID: b40d17a970ea470072cc094887da7a6dca03317504114bf01e9f4a1a4d97d151
                                                          • Opcode Fuzzy Hash: 6bb2def5445f3f3c03a7c343a9c0ad1c6318bdf414d74d1a9ec3108368a0102b
                                                          • Instruction Fuzzy Hash: 71516D34900249DFEB11CFA4C954AEDBBB4FF95344F244099E845A7246DB74AF01DB62
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: ef6ed3350f196110724b134d7ae58aa8eb2fad54a812ca61983dfb10647da9bd
                                                          • Instruction ID: 1deedfb3ed3693e114189d5c8674f5dba158b51214873baba276ba9a2bcc193c
                                                          • Opcode Fuzzy Hash: ef6ed3350f196110724b134d7ae58aa8eb2fad54a812ca61983dfb10647da9bd
                                                          • Instruction Fuzzy Hash: 73419F74900246CFDB24CF58C88496ABBF2FF48358B2546ADD0999B351C731ED46CF50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 5099f1d692100a5232163a5791f00c8b8683fd86d0e2744a0ba1ce0008d983f8
                                                          • Instruction ID: 59f6696383dde50044605197c7a13ccbc641f9314ce92faebeca66c50bce22a2
                                                          • Opcode Fuzzy Hash: 5099f1d692100a5232163a5791f00c8b8683fd86d0e2744a0ba1ce0008d983f8
                                                          • Instruction Fuzzy Hash: 47219F7198468ADBFB24CF60D9808EEB7B6EB412D0B21852DE49267648D730FE41CB91
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,?,?,?), ref: 1001899F
                                                            • Part of subcall function 1001A13A: InitializeCriticalSection.KERNEL32(00000000,?,?,?,10018A6D,00000009,?,?,?), ref: 1001A177
                                                            • Part of subcall function 1001A13A: EnterCriticalSection.KERNEL32(?,?,?,10018A6D,00000009,?,?,?), ref: 1001A192
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$AllocateEnterHeapInitialize
                                                          • String ID:
                                                          • API String ID: 1616793339-0
                                                          • Opcode ID: 64ac742c6e18b1ebf1a9d12a1be87a2e2d80d958cc1a171f76a8005aa0769b83
                                                          • Instruction ID: bde266228d008e092059639ff97bb6b14f601e90ad82446575358dbeed7d10ff
                                                          • Opcode Fuzzy Hash: 64ac742c6e18b1ebf1a9d12a1be87a2e2d80d958cc1a171f76a8005aa0769b83
                                                          • Instruction Fuzzy Hash: C5219032A00255BAEB10DB68DC42BADB7A4FB01764F284215F924EF1C0C774EBC18B52
                                                          APIs
                                                            • Part of subcall function 6C8125A0: FindClose.KERNEL32(FFFFFFFF,?,0FD3DAC1,?,00000000,6C8350B8,?,6C830438,000000FF,?,6C81265E), ref: 6C8125EA
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80A992
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseExceptionException@8FindRaiseThrow
                                                          • String ID:
                                                          • API String ID: 2665002293-0
                                                          • Opcode ID: 7a90378b73dc52992220c408f1be754bec036784cf16a3f79813b43db7d8cc93
                                                          • Instruction ID: 80b90bb5ff49bc635dad49e28aa48ecfcecaa2749552c19cd67f87ff02fcaebb
                                                          • Opcode Fuzzy Hash: 7a90378b73dc52992220c408f1be754bec036784cf16a3f79813b43db7d8cc93
                                                          • Instruction Fuzzy Hash: 6E1175B2600704ABC720DF69C980EDBF7F8FF55218F104A2EE95687750EB35A549CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 1b3d449f9b1d9ca4bc486b6888b2a71bf231b77982e7f41f13db39985a04daa4
                                                          • Instruction ID: c4781e215bb38ec63fc671d50aeec44c86b20336711f2647e792547350c1aef8
                                                          • Opcode Fuzzy Hash: 1b3d449f9b1d9ca4bc486b6888b2a71bf231b77982e7f41f13db39985a04daa4
                                                          • Instruction Fuzzy Hash: 3911E232A4124A9FFB14CF64C9808EEB3F2EB403D0B21813DE052A7648D730FE428B90
                                                          APIs
                                                          • GetLastError.KERNEL32(6C80890F,0FD3DAC1,?,?,00000000), ref: 6C811528
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast
                                                          • String ID:
                                                          • API String ID: 1452528299-0
                                                          • Opcode ID: fef0abf245c720c4c0ba42f27a667fe0cbdd536a87358ec58256613d87ff3943
                                                          • Instruction ID: 484ee55d25bd0a4489836402a16ae83a22f836694aff01f0e611c1544dee1bec
                                                          • Opcode Fuzzy Hash: fef0abf245c720c4c0ba42f27a667fe0cbdd536a87358ec58256613d87ff3943
                                                          • Instruction Fuzzy Hash: D7B1A471E0420A8BCF24CF98DA81AEEB7F5FF54308F184969D806A7B44E735E909C791
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: b051d9f97361328a0859d23c7aef542bc19b666e6010b629010daeab35dc1547
                                                          • Instruction ID: 1a273919c2d2e3c34155be655625f51d11ef425e7a56d82b9c8decfb09a307f8
                                                          • Opcode Fuzzy Hash: b051d9f97361328a0859d23c7aef542bc19b666e6010b629010daeab35dc1547
                                                          • Instruction Fuzzy Hash: 4011CE71A44155ABE722CF29CC05B9F37A9EF0A7E4F008119F805DB265DB31DD01C790
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 100039CD
                                                            • Part of subcall function 10003600: __EH_prolog.LIBCMT ref: 10003605
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 257c9c1ad85ce65f22fa997ad81c770c6af4072d1a7d7a18d6b680d099e47f4b
                                                          • Instruction ID: a8771e25a5af01616f041783a1a562797f3037f43c5b4569f99eca130688d05b
                                                          • Opcode Fuzzy Hash: 257c9c1ad85ce65f22fa997ad81c770c6af4072d1a7d7a18d6b680d099e47f4b
                                                          • Instruction Fuzzy Hash: 44118274E01795DAEB09DBA8C9153EEFBEADF95300F54414D9057A7282CBF42B04C7A2
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10006A25
                                                            • Part of subcall function 10001B41: GetSystemInfo.KERNEL32(?), ref: 10001B4B
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prologInfoSystem
                                                          • String ID:
                                                          • API String ID: 3096475795-0
                                                          • Opcode ID: 52262b521e3cf9d1fda4bec855af299aea3512d706ab6bf0f58a7f0b292b1210
                                                          • Instruction ID: 655e083bcbb9f064a1fc17e82f19a2947c3b56c2b4f5fa8eba001858af0e0911
                                                          • Opcode Fuzzy Hash: 52262b521e3cf9d1fda4bec855af299aea3512d706ab6bf0f58a7f0b292b1210
                                                          • Instruction Fuzzy Hash: 8701A2B0901B949FD320CF59D48469AFBE5FB09300F90886EE4AA9B612C7B8A6448F50
                                                          APIs
                                                            • Part of subcall function 6C812470: FindClose.KERNEL32(?,0FD3DAC1,6C830658,00000000), ref: 6C8124C4
                                                            • Part of subcall function 6C812470: FindFirstFileW.KERNEL32(6C8350B8,?,0FD3DAC1,6C830658,00000000), ref: 6C8124DE
                                                            • Part of subcall function 6C812470: FindFirstFileW.KERNEL32(?,?), ref: 6C81253A
                                                          • FindClose.KERNEL32(FFFFFFFF,?,0FD3DAC1,?,00000000,6C8350B8,?,6C830438,000000FF,?,6C81265E), ref: 6C8125EA
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: d0aada867c008bb657fd414bd24c1efd3d933e2fd678b31d4388f946149a8b4d
                                                          • Instruction ID: c413fbda5e583fdda4273d5577bc4407d0fc0f85c7ce465d1f2e1d54ad6fe1c1
                                                          • Opcode Fuzzy Hash: d0aada867c008bb657fd414bd24c1efd3d933e2fd678b31d4388f946149a8b4d
                                                          • Instruction Fuzzy Hash: 66F062B6904649AFC720CF98C944BDAB7B8FB06624F501B2AF435D37C0D7346905CAA0
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10001C8F
                                                            • Part of subcall function 10001BB2: __EH_prolog.LIBCMT ref: 10001BB7
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 45d6ff788914fcc1d4c4362c08418d30e3fc6f4cbe7bfcd3fb78a9b9f7420235
                                                          • Instruction ID: 5875ca03f24213d4aa71392faa60c1249694dc7a06dd944ad61b31c616a183da
                                                          • Opcode Fuzzy Hash: 45d6ff788914fcc1d4c4362c08418d30e3fc6f4cbe7bfcd3fb78a9b9f7420235
                                                          • Instruction Fuzzy Hash: 3AF03432A00219ABEB05CF98CC01BEEB7B9EB44365F108659B821E7290C775EE00CB50
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10001C8F
                                                            • Part of subcall function 10001BB2: __EH_prolog.LIBCMT ref: 10001BB7
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: a6999b822fc1317c87866c67a3b2559ab8b1b0de13d547d74b0740a9a50685af
                                                          • Instruction ID: a1ce7e251bf4dddfe6d8e665bceb41a424ebb3d89783d3dba666d18c8877da87
                                                          • Opcode Fuzzy Hash: a6999b822fc1317c87866c67a3b2559ab8b1b0de13d547d74b0740a9a50685af
                                                          • Instruction Fuzzy Hash: 43F0F876A00219EBEB15CF94CC05BEEB7B9FB44365F108659B825E7290C775AA10CB50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 5e305e5dd078dffe59473feca98cbca4bc7fff0512b603f2e5de80fa23a82b3e
                                                          • Instruction ID: 00a3cd71fa0aca0c29c4385373171d1cf368eeee970badd092b8d780c186b9fa
                                                          • Opcode Fuzzy Hash: 5e305e5dd078dffe59473feca98cbca4bc7fff0512b603f2e5de80fa23a82b3e
                                                          • Instruction Fuzzy Hash: ECE09275E00510ABDB08DFA88C066AE7AE5EB04360F10462EA016E72C1DFB06B408654
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 10006B56
                                                            • Part of subcall function 10006B9E: __EH_prolog.LIBCMT ref: 10006BA3
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: c2b4014cf6554101de5823dbb260c55468e89f1724bea5b528826ce213b76a0a
                                                          • Instruction ID: 8d9a37c6723f40ac26746b696ab844ca15524eaf609cb6dee056dacbd79d311a
                                                          • Opcode Fuzzy Hash: c2b4014cf6554101de5823dbb260c55468e89f1724bea5b528826ce213b76a0a
                                                          • Instruction Fuzzy Hash: 8BF08C71C01A60DBD724CF54C8057DEB7B4EF08310F10464EA8A6A7281CBB0BA40CB90
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 1000A49B
                                                            • Part of subcall function 1000A0CE: __EH_prolog.LIBCMT ref: 1000A0D3
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 49073b19b42d1aece4de8f7d12bddb7de673f44c594ea106af3184a1002e2511
                                                          • Instruction ID: 889d54ac72d292b4943fb779c3a4a2c7d1dd2e9b7142568b78a9c6437da24382
                                                          • Opcode Fuzzy Hash: 49073b19b42d1aece4de8f7d12bddb7de673f44c594ea106af3184a1002e2511
                                                          • Instruction Fuzzy Hash: 12E08C36900148FBDF02CF84C805FEF7B75EB452A0F00851AF40415051C3BAAA50DBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExitThread
                                                          • String ID:
                                                          • API String ID: 2158977761-0
                                                          • Opcode ID: 0fe3482dfa25c527acbd858d9d887206c278c7a8d427f86923067702572674c7
                                                          • Instruction ID: 587474e3f6e270900c506b7264c4806e64e6eaefbf2122b89b9aa41b5ebd9e7a
                                                          • Opcode Fuzzy Hash: 0fe3482dfa25c527acbd858d9d887206c278c7a8d427f86923067702572674c7
                                                          • Instruction Fuzzy Hash: D6E08C3694052AABEB12E7A0CC46A9E37A0EF08380F040010F8005E062DB70FED24692
                                                          APIs
                                                          • HeapCreate.KERNEL32(00000000,00001000,00000000,?,6C826375,00000001,?,?,?,6C8264EE,?,?,?,6C837F18,0000000C,6C8265A9), ref: 6C8293F6
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CreateHeap
                                                          • String ID:
                                                          • API String ID: 10892065-0
                                                          • Opcode ID: cba11fef73a0a204fc92d39d3b2d8d022a794380989423725ed0d52155a641f5
                                                          • Instruction ID: 842c3f078a2e1e7ffc9b4c6446577512edf3c161543d9c0ca5f77bc56e0d98c2
                                                          • Opcode Fuzzy Hash: cba11fef73a0a204fc92d39d3b2d8d022a794380989423725ed0d52155a641f5
                                                          • Instruction Fuzzy Hash: 17D05E726543495ADB315EF59C08B263BECA78639DF048C75B80CC6540E778C541C6C0
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 1000AB92
                                                            • Part of subcall function 10006A20: __EH_prolog.LIBCMT ref: 10006A25
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID:
                                                          • API String ID: 3519838083-0
                                                          • Opcode ID: 7465464f3484d0fe6a61d7cab71274671711f41a51988a712e270957caaa37a7
                                                          • Instruction ID: f583651af7419ed68212601d7f78bfec3ebd47bcdcb2918c529af6d70d782719
                                                          • Opcode Fuzzy Hash: 7465464f3484d0fe6a61d7cab71274671711f41a51988a712e270957caaa37a7
                                                          • Instruction Fuzzy Hash: 1AD05E75F14141AFEB08DBB4981636D76E2EB48280F10856DA012E66C1DFB0BA80C625
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExitThread
                                                          • String ID:
                                                          • API String ID: 2158977761-0
                                                          • Opcode ID: e83cf6b22c983a4ed28e69ad6d1585a06803cfa532badbaccde98c5e56e59925
                                                          • Instruction ID: 55bdce0fba70f3b5ff24939f3ea0e7f6c7887ef7bde984f872fb15fca6cc6046
                                                          • Opcode Fuzzy Hash: e83cf6b22c983a4ed28e69ad6d1585a06803cfa532badbaccde98c5e56e59925
                                                          • Instruction Fuzzy Hash: 4FD05E31540626ABE213E770DC86A5E2394DF05790B110115F8408D062DF70FEC24192
                                                          APIs
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 1000284F
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalLeaveSection
                                                          • String ID:
                                                          • API String ID: 3988221542-0
                                                          • Opcode ID: 56af7d4527998fa58668fa72375b4fbb66d6daa40091eae34442c31c73413363
                                                          • Instruction ID: 11d10b3ae5732a811c03e9ac0d646ffa47e7b15fd82cf01c80c2bb2696228c6f
                                                          • Opcode Fuzzy Hash: 56af7d4527998fa58668fa72375b4fbb66d6daa40091eae34442c31c73413363
                                                          • Instruction Fuzzy Hash: 18F03036A01155DFDB12DFA4C808A89BBA5FF84794B16845AF955D7220D734CC12DF60
                                                          APIs
                                                            • Part of subcall function 10019CB8: CreateThread.KERNEL32(00000000,00000000,10019D23,00000000,?,?), ref: 10019CF9
                                                            • Part of subcall function 10019CB8: GetLastError.KERNEL32(?,10017589,00000000,00000000,10002FF6,00000000,00000000,00000000,?,10002FF2,?,?,?,?,10003E76,?), ref: 10019D03
                                                          • GetLastError.KERNEL32 ref: 10017598
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$CreateThread
                                                          • String ID:
                                                          • API String ID: 665435222-0
                                                          • Opcode ID: 6a6f0967b860a04a4a08b52caf4fd14ddb262ad7e1e0691d2c85b8c655ef118e
                                                          • Instruction ID: 5da84cd6a30c0b06f2c1d8553272c344b363e72c39abfbd7409f2c23709d4e44
                                                          • Opcode Fuzzy Hash: 6a6f0967b860a04a4a08b52caf4fd14ddb262ad7e1e0691d2c85b8c655ef118e
                                                          • Instruction Fuzzy Hash: 2EE0ECB2254252AEF304DB648C46FA776E9EB94B81F50442DBA49CA180E6B0D944C7B5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 3c58fb68337e81eae94cbab879bccf07c2604fcdb40a933bdcc92a853caaa15f
                                                          • Instruction ID: 2af4e6f552997be82ae4806cb39d6a55a37a408d448525cc9021577b0119ca2f
                                                          • Opcode Fuzzy Hash: 3c58fb68337e81eae94cbab879bccf07c2604fcdb40a933bdcc92a853caaa15f
                                                          • Instruction Fuzzy Hash: 80E09272301B1016C6305AA89A05B46BBD85F41378BA09F28E47987ED0D375E446C7D0
                                                          APIs
                                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,10001E62,?,?,1000B459,?), ref: 10012A31
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 0101ec0f5aa2d88080453061d33e9d0ea43cdee5597a4dbf4051f6854f2c80fe
                                                          • Instruction ID: 499c3da3a26d341c9e988975342de67c6826636d0b386d7712dafe969d9ecfde
                                                          • Opcode Fuzzy Hash: 0101ec0f5aa2d88080453061d33e9d0ea43cdee5597a4dbf4051f6854f2c80fe
                                                          • Instruction Fuzzy Hash: 18B012F07B238176FE6E87204C5BF662451A740BC7F601098F301DC0C4E7E094409015
                                                          APIs
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,10001E7E,?,10001E58,?,?,1000B459,?), ref: 10012A4C
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FreeVirtual
                                                          • String ID:
                                                          • API String ID: 1263568516-0
                                                          • Opcode ID: 66144b5ccae04c28c88a4e760bc3cd1d0957039cec557337da64c84822766760
                                                          • Instruction ID: 32e2f69f7c2909d2d391187de9ef312e1eea697864ad2fb4147c7fa98b3e1f25
                                                          • Opcode Fuzzy Hash: 66144b5ccae04c28c88a4e760bc3cd1d0957039cec557337da64c84822766760
                                                          • Instruction Fuzzy Hash: 96B012B034230023FD78C3110D45B1611506B00741E60405C73016C4C08570E4018504
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2326752848.000000000045D000.00000020.00000001.01000000.00000004.sdmp, Offset: 0045D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_45d000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0e7b173bbb215450c8b4f74675491754b7c61381db732ae293535029b8f08084
                                                          • Instruction ID: d99f86c8ffeddc58f6e936e0a3f2476e49bd5441f60632e001b21c3972d2faf1
                                                          • Opcode Fuzzy Hash: 0e7b173bbb215450c8b4f74675491754b7c61381db732ae293535029b8f08084
                                                          • Instruction Fuzzy Hash: 5F0165B16002046FCB10EB98DC81FAB37A9FB08315F048216FD14D7296DBBDD884876D
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2326752848.000000000045D000.00000020.00000001.01000000.00000004.sdmp, Offset: 0045D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_45d000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 49f8392043f557017d62716db24232c23fbed2275b2329eef47e5a4435b534a6
                                                          • Instruction ID: 198944c7f122d1c37403e03e802124c787ccbd8fdaa22fabfa5f4f4463f0d47f
                                                          • Opcode Fuzzy Hash: 49f8392043f557017d62716db24232c23fbed2275b2329eef47e5a4435b534a6
                                                          • Instruction Fuzzy Hash: 1EC0122160663826162032A92CC18EA00488C472AA32803BBFC20962A3DA8C9DC602AE
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 6C826B91
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C826BA6
                                                          • UnhandledExceptionFilter.KERNEL32(6C833328), ref: 6C826BB1
                                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 6C826BCD
                                                          • TerminateProcess.KERNEL32(00000000), ref: 6C826BD4
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                          • String ID:
                                                          • API String ID: 2579439406-0
                                                          • Opcode ID: cf4748adb3f663d519eb74e4203f9119c9f348870c41fa61b26e54a55833470e
                                                          • Instruction ID: e35485601bd63b986358f0dba34f02410f7db2e316e3edb0e1eb3419e28705ff
                                                          • Opcode Fuzzy Hash: cf4748adb3f663d519eb74e4203f9119c9f348870c41fa61b26e54a55833470e
                                                          • Instruction Fuzzy Hash: 4E219575A10204DFCF32DF99E144A483BB4BB2A31DF5069BAE80D87250E7B45985CFC5
                                                          APIs
                                                          • OpenFileMappingW.KERNEL32(00000004,00000000,?,00000002), ref: 6C802BB4
                                                          • GetLastError.KERNEL32 ref: 6C802BC3
                                                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 6C802BDF
                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 6C802C88
                                                          • CloseHandle.KERNEL32(?), ref: 6C802C96
                                                          • OpenEventW.KERNEL32(00000002,00000000,?), ref: 6C802CA8
                                                          • GetLastError.KERNEL32 ref: 6C802CBD
                                                          • SetEvent.KERNEL32(00000000), ref: 6C802CC4
                                                          • GetLastError.KERNEL32 ref: 6C802CCE
                                                          • CloseHandle.KERNEL32(00000000), ref: 6C802CD5
                                                          • GetLastError.KERNEL32 ref: 6C802CDF
                                                            • Part of subcall function 6C802670: __CxxThrowException@8.LIBCMT ref: 6C802688
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$File$CloseEventHandleOpenView$Exception@8MappingThrowUnmap
                                                          • String ID: Can not open mapping$Incorrect command line$Incorrect mapping data$MapViewOfFile error$data error
                                                          • API String ID: 682782048-464465891
                                                          • Opcode ID: cdd2d9b843dee31e870c239ba8d34008b695c1abff4be2605d16ba205c05a6ca
                                                          • Instruction ID: 02a45d3776fa9d09b7075c123710270978efb7e6a13836b67c4285fc3fc55034
                                                          • Opcode Fuzzy Hash: cdd2d9b843dee31e870c239ba8d34008b695c1abff4be2605d16ba205c05a6ca
                                                          • Instruction Fuzzy Hash: 1E61D071B006199BCB30DFA8CE48BDEB7B4AF45358F144924E914A7B40DBB8ED09C7A1
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6C837F58,0000000C,6C827296,00000000,00000000,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B), ref: 6C82716D
                                                          • __crt_waiting_on_module_handle.LIBCMT ref: 6C827178
                                                            • Part of subcall function 6C827790: Sleep.KERNEL32(000003E8,?,?,6C8270BE,KERNEL32.DLL,?,6C8294A4,?,6C825FE3,6C80FA7E,?,?,6C804D3F,0000000C,0FD3DAC1,?), ref: 6C82779C
                                                            • Part of subcall function 6C827790: GetModuleHandleW.KERNEL32(6C80FA7E,?,6C8270BE,KERNEL32.DLL,?,6C8294A4,?,6C825FE3,6C80FA7E,?,?,6C804D3F,0000000C,0FD3DAC1,?,?), ref: 6C8277A5
                                                          • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6C8271A1
                                                          • GetProcAddress.KERNEL32(?,DecodePointer), ref: 6C8271B1
                                                          • __lock.LIBCMT ref: 6C8271D3
                                                          • InterlockedIncrement.KERNEL32(02C08302), ref: 6C8271E0
                                                          • __lock.LIBCMT ref: 6C8271F4
                                                          • ___addlocaleref.LIBCMT ref: 6C827212
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                          • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                          • API String ID: 1028249917-2843748187
                                                          • Opcode ID: 481287055b9b5e66a56ea54333be580ce811601f3b90a968bd269600fc630721
                                                          • Instruction ID: 1fe232d1c7d58a95574bbb6c4a353fa205eb87eb181e5c64c52c62105fd11e77
                                                          • Opcode Fuzzy Hash: 481287055b9b5e66a56ea54333be580ce811601f3b90a968bd269600fc630721
                                                          • Instruction Fuzzy Hash: 5B118471500705DAD7309FBACA0578AB7F0AF01318F105D29E89993B90CB38A985CBD4
                                                          APIs
                                                            • Part of subcall function 6C821230: _malloc.LIBCMT ref: 6C821258
                                                            • Part of subcall function 6C821230: __CxxThrowException@8.LIBCMT ref: 6C821272
                                                          • __CxxThrowException@8.LIBCMT ref: 6C820704
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C818324
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C818390
                                                            • Part of subcall function 6C8182B0: _malloc.LIBCMT ref: 6C8183B1
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C8183CB
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C818416
                                                            • Part of subcall function 6C825FF4: __lock.LIBCMT ref: 6C826012
                                                            • Part of subcall function 6C825FF4: ___sbh_find_block.LIBCMT ref: 6C82601D
                                                            • Part of subcall function 6C825FF4: ___sbh_free_block.LIBCMT ref: 6C82602C
                                                            • Part of subcall function 6C825FF4: HeapFree.KERNEL32(00000000,6C80FA7E,6C837EB0,0000000C,6C8281B5,00000000,6C838028,0000000C,6C8281EF,6C80FA7E,?,?,6C82C6AB,00000004,6C8382E8,0000000C), ref: 6C82605C
                                                            • Part of subcall function 6C825FF4: GetLastError.KERNEL32(?,6C82C6AB,00000004,6C8382E8,0000000C,6C827669,6C80FA7E,?,00000000,00000000,00000000,?,6C82726D,00000001,00000214), ref: 6C82606D
                                                          • __CxxThrowException@8.LIBCMT ref: 6C820A37
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$_malloc$ErrorExceptionFreeHeapLastRaise___sbh_find_block___sbh_free_block__lock
                                                          • String ID: -mhe$ -sfx$ -ssw$ -w$7za
                                                          • API String ID: 1499254937-429077366
                                                          • Opcode ID: 4b409ad7aa71b9cf6b17e1d33c9cc636ac6cbe3416ca3ea30dcb4d674b50389e
                                                          • Instruction ID: dc4d1cb714fca8c6f920191bd0eaefc03a277bd7f440b22ec031ec835ddd170f
                                                          • Opcode Fuzzy Hash: 4b409ad7aa71b9cf6b17e1d33c9cc636ac6cbe3416ca3ea30dcb4d674b50389e
                                                          • Instruction Fuzzy Hash: 00C18271901248DFDB20DBE8CE84BDEB7B8AF54308F144869E8056B745D7B4AA4CCBE1
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,1001CEDA,?,Microsoft Visual C++ Runtime Library,00012010,?,10021594,?,100215E4,?,?,?,Runtime Error!Program: ), ref: 1001D856
                                                          • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 1001D86E
                                                          • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 1001D87F
                                                          • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 1001D88C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$LibraryLoad
                                                          • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                          • API String ID: 2238633743-4044615076
                                                          • Opcode ID: fdf4bd263d9911628fa84a0538cd68ee630e044ef978d7ae2b799142876d2cfd
                                                          • Instruction ID: 0f002242f215f962b8815e3b350398d74b100aa23eb915cf8c40db05b23b1dbb
                                                          • Opcode Fuzzy Hash: fdf4bd263d9911628fa84a0538cd68ee630e044ef978d7ae2b799142876d2cfd
                                                          • Instruction Fuzzy Hash: A9014431604221AFE750FFF59CC4AAA7BE9EB59194721043BF604C6121DF35C8829B70
                                                          APIs
                                                          • LCMapStringW.KERNEL32(00000000,00000100,10021660,00000001,00000000,00000000,74DEE860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DD7F
                                                          • LCMapStringA.KERNEL32(00000000,00000100,1002165C,00000001,00000000,00000000,?,?,1001DA1F,?), ref: 1001DD9B
                                                          • LCMapStringA.KERNEL32(?,?,00000000,00000001,00000000,00000003,74DEE860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DDE4
                                                          • MultiByteToWideChar.KERNEL32(?,1002CE51,00000000,00000001,00000000,00000000,74DEE860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DE1C
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,?,00000000), ref: 1001DE74
                                                          • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 1001DE8A
                                                          • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 1001DEBD
                                                          • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 1001DF25
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: String$ByteCharMultiWide
                                                          • String ID:
                                                          • API String ID: 352835431-0
                                                          • Opcode ID: 7282f78b9d4349d0a3e93c4e54105c3ff287b2395515df487960fdaa6e95e452
                                                          • Instruction ID: 295e34877b95ddc79519c14bcd414cd7068b9c5c0158a783dd3936514e77c558
                                                          • Opcode Fuzzy Hash: 7282f78b9d4349d0a3e93c4e54105c3ff287b2395515df487960fdaa6e95e452
                                                          • Instruction Fuzzy Hash: FB517B31400259ABDF22EF94CD85ADE3FF9FB59751F20411AF910A9160C732DDA1EB60
                                                          APIs
                                                          • GetProcAddress.KERNEL32(6C816AD8,GetHandlerProperty2), ref: 6C816584
                                                          • GetProcAddress.KERNEL32(?,GetHandlerProperty), ref: 6C816595
                                                          • GetProcAddress.KERNEL32(?,GetNumberOfFormats), ref: 6C8165B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AddressProc
                                                          • String ID: GetHandlerProperty$GetHandlerProperty2$GetNumberOfFormats
                                                          • API String ID: 190572456-3564775856
                                                          • Opcode ID: daad2702f04561a605ac759754dcf60bdb8399dcaf0ddfe1c05f92fc14e3c1e1
                                                          • Instruction ID: fbe482411472e238d71df9fd6a7c3709ddfb328685c170473bab45de82e730e6
                                                          • Opcode Fuzzy Hash: daad2702f04561a605ac759754dcf60bdb8399dcaf0ddfe1c05f92fc14e3c1e1
                                                          • Instruction Fuzzy Hash: 77D159B1D042199BDB24CFA9CA80ADEB7B4FF48304F1049ADE559E7A40DB305A49CF61
                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 1001CE23
                                                          • GetStdHandle.KERNEL32(000000F4,10021594,00000000,?,00000000,?), ref: 1001CEF9
                                                          • WriteFile.KERNEL32(00000000), ref: 1001CF00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: File$HandleModuleNameWrite
                                                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                          • API String ID: 3784150691-4022980321
                                                          • Opcode ID: 1d1f0148e6be3939dc2033fdbd363d62c3fffa52be97f4f1b611f55ef9c5ba02
                                                          • Instruction ID: d8c9acc08caec27d87d178c777f48a963db8df66c36a8e0edad6fccd900c7ff8
                                                          • Opcode Fuzzy Hash: 1d1f0148e6be3939dc2033fdbd363d62c3fffa52be97f4f1b611f55ef9c5ba02
                                                          • Instruction Fuzzy Hash: 4131C476A0022CAFEB11EAA0CD85FDE77BDFB45344F6001A6F945DA041E770EAC5CA61
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CC66
                                                          • GetEnvironmentStrings.KERNEL32(?,?,?,?,10019F70), ref: 1001CC7A
                                                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CCA6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,10019F70), ref: 1001CCDE
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,10019F70), ref: 1001CD00
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,10019F70), ref: 1001CD19
                                                          • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CD2C
                                                          • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 1001CD6A
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                          • String ID:
                                                          • API String ID: 1823725401-0
                                                          • Opcode ID: 27e7f926a98a65f15a8b3ff8da03a04564288c716e1c3f2051146ef706dc850c
                                                          • Instruction ID: 10dabb665d0db05ed410ab17b42963db07fe2840a9ab64d8aea903b972c4df90
                                                          • Opcode Fuzzy Hash: 27e7f926a98a65f15a8b3ff8da03a04564288c716e1c3f2051146ef706dc850c
                                                          • Instruction Fuzzy Hash: 7331A6B25043AE5FE311EBB8ACC5D2A7ADDEB4A1D4B220639F545CB111EA31DCC187A1
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C820C28
                                                          • __CxxThrowException@8.LIBCMT ref: 6C820C42
                                                          • __CxxThrowException@8.LIBCMT ref: 6C820D3F
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • __CxxThrowException@8.LIBCMT ref: 6C820D54
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise_malloc
                                                          • String ID: -an$7za l
                                                          • API String ID: 1305767944-193614407
                                                          • Opcode ID: 31426acb0f68344327cd1188e4e906e0760aa35e0b7a362aa584a0025d193eda
                                                          • Instruction ID: 0001535ff2c2404442957e5e7a5e1305060e75f253d62d1e3bcfe71c74d18095
                                                          • Opcode Fuzzy Hash: 31426acb0f68344327cd1188e4e906e0760aa35e0b7a362aa584a0025d193eda
                                                          • Instruction Fuzzy Hash: 45917371905248DFCF20DFA8CA84BCEBBB4AF54308F144969E805AB745D778EA49CBD1
                                                          APIs
                                                          • FindMITargetTypeInstance.LIBCMT ref: 6C82E624
                                                            • Part of subcall function 6C82E370: PMDtoOffset.LIBCMT ref: 6C82E400
                                                          • FindVITargetTypeInstance.LIBCMT ref: 6C82E62B
                                                          • PMDtoOffset.LIBCMT ref: 6C82E63B
                                                          • std::bad_exception::bad_exception.LIBCMT ref: 6C82E661
                                                          • __CxxThrowException@8.LIBCMT ref: 6C82E66F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FindInstanceOffsetTargetType$Exception@8Throwstd::bad_exception::bad_exception
                                                          • String ID: Bad dynamic_cast!
                                                          • API String ID: 3308565544-2956939130
                                                          • Opcode ID: bc75f9e06bff0e2a3ea0b34566b67c98a802499e2ff3c98167bd89500281aabb
                                                          • Instruction ID: 4a1dc7dcea28c0a446a609afbf50618d1928faa9267fbb728459e51276d5cf23
                                                          • Opcode Fuzzy Hash: bc75f9e06bff0e2a3ea0b34566b67c98a802499e2ff3c98167bd89500281aabb
                                                          • Instruction Fuzzy Hash: E8118C329002159FCB20DEB9CB48ADE77B0AF44326F140D69E415E7B90DB389985DBE8
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81F621
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw
                                                          • String ID: -aoa$ -aos$ -aot$ -aou$ -r0
                                                          • API String ID: 2005118841-2704224164
                                                          • Opcode ID: 2450b47fecff2f4967543b3cd8139f966929a4f18896c8b7c8358ed97825f5db
                                                          • Instruction ID: 2c05248aaa3eda367ec95852a926736a16ea1dd3f05f7d598bb42f5945f07cc1
                                                          • Opcode Fuzzy Hash: 2450b47fecff2f4967543b3cd8139f966929a4f18896c8b7c8358ed97825f5db
                                                          • Instruction Fuzzy Hash: 3EF04F2074A52D9386319ADCAE0149D739C879595AF006DB6F80DDBF00CB668E2563CA
                                                          APIs
                                                            • Part of subcall function 6C812A70: CloseHandle.KERNEL32(?,0FD3DAC1,?,00000000,?,?,00000000,?,?,?,00000000,6C830C38,000000FF), ref: 6C812A9F
                                                            • Part of subcall function 6C812A70: CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,0FD3DAC1,?,00000000,?,?,00000000), ref: 6C812ACC
                                                            • Part of subcall function 6C812A70: CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6C812B2B
                                                          • GetFileSize.KERNEL32(FFFFFFFF,?,00000004,80000000,00000001,00000003,0FD3DAC1,?,?,00000000,?,?,?,00000000,6C830C38,000000FF), ref: 6C8104A7
                                                          • GetLastError.KERNEL32(?,?,?,00000000,6C830C38,000000FF), ref: 6C8104B4
                                                          • CloseHandle.KERNEL32(FFFFFFFF,00000004,80000000,00000001,00000003,0FD3DAC1,?,?,00000000,?,?,?,00000000,6C830C38,000000FF), ref: 6C81051D
                                                          • CloseHandle.KERNEL32(FFFFFFFF,?,00000000,00000000,00000001,?,?,?,00000000,6C830C38,000000FF), ref: 6C81053D
                                                          • CloseHandle.KERNEL32(FFFFFFFF,FFFFFFFF,00000000,?,00000000,00000000,00000001,?,?,?,00000000,6C830C38,000000FF), ref: 6C81056C
                                                            • Part of subcall function 6C810A20: MultiByteToWideChar.KERNEL32(00000002,00000000,?,?,?,?,0FD3DAC1,00000000), ref: 6C810AA7
                                                            • Part of subcall function 6C810A20: __CxxThrowException@8.LIBCMT ref: 6C810AC1
                                                          • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,00000000,00000001,?,?,?,00000000), ref: 6C8106D8
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$File$Create$ByteCharErrorException@8LastMultiSizeThrowWide
                                                          • String ID:
                                                          • API String ID: 1518168698-0
                                                          • Opcode ID: 20d2197091d3a23a19111c85e7cd5bd4caf0bd869686543bc08e95b14322f69c
                                                          • Instruction ID: 57e15690c57b4b421b8714abeac96472574afcc7885a65f94445e8bd297895dc
                                                          • Opcode Fuzzy Hash: 20d2197091d3a23a19111c85e7cd5bd4caf0bd869686543bc08e95b14322f69c
                                                          • Instruction Fuzzy Hash: B581A572E042499BCF20DFA8DE44BDEB7B5EF45318F104A29E815B7B80D7349959CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw_malloc
                                                          • String ID: -ir-!$ -p$ -r$7za A
                                                          • API String ID: 3476970888-2239425251
                                                          • Opcode ID: e5818f9e8e794f3378845fff83b465651c160416585b9e5136d9f59095c7ee78
                                                          • Instruction ID: 564a14f8fdf9ea075e5bb1f747c8d0179cbaf8a5cdc5eb900956380464c2e6f4
                                                          • Opcode Fuzzy Hash: e5818f9e8e794f3378845fff83b465651c160416585b9e5136d9f59095c7ee78
                                                          • Instruction Fuzzy Hash: 6502A271D01248DBCB20DBE8CE48BCEB7B8AF44308F144869E80567745D779AE89CBE1
                                                          APIs
                                                          • GetStringTypeW.KERNEL32(00000001,10021660,00000001,?,74DEE860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001DFCB
                                                          • GetStringTypeA.KERNEL32(00000000,00000001,1002165C,00000001,?,?,?,1001DA1F,?), ref: 1001DFE5
                                                          • GetStringTypeA.KERNEL32(?,?,?,00000000,00000002,74DEE860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001E019
                                                          • MultiByteToWideChar.KERNEL32(?,1002CE51,?,00000000,00000000,00000000,74DEE860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001E051
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 1001E0A7
                                                          • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 1001E0B9
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: StringType$ByteCharMultiWide
                                                          • String ID:
                                                          • API String ID: 3852931651-0
                                                          • Opcode ID: 9cb96698784a2f131f153e3bcad8cc4bc2e41755872ea77c6cd091048275da51
                                                          • Instruction ID: 73f36e6d74bf66f6ce57e3c8a420cabe8a1af6d8c6052cc8844ff2d98f481940
                                                          • Opcode Fuzzy Hash: 9cb96698784a2f131f153e3bcad8cc4bc2e41755872ea77c6cd091048275da51
                                                          • Instruction Fuzzy Hash: 0041577250029AAFDB21DF94CC85EDE7BBAEB09790F20052AFA119A150C735DDD1CBA0
                                                          APIs
                                                          • __CreateFrameInfo.LIBCMT ref: 6C82AD0B
                                                            • Part of subcall function 6C826968: __getptd.LIBCMT ref: 6C826976
                                                            • Part of subcall function 6C826968: __getptd.LIBCMT ref: 6C826984
                                                          • __getptd.LIBCMT ref: 6C82AD15
                                                            • Part of subcall function 6C8272BB: __getptd_noexit.LIBCMT ref: 6C8272BE
                                                            • Part of subcall function 6C8272BB: __amsg_exit.LIBCMT ref: 6C8272CB
                                                          • __getptd.LIBCMT ref: 6C82AD23
                                                          • __getptd.LIBCMT ref: 6C82AD31
                                                          • __getptd.LIBCMT ref: 6C82AD3C
                                                          • _CallCatchBlock2.LIBCMT ref: 6C82AD62
                                                            • Part of subcall function 6C826A0D: __CallSettingFrame@12.LIBCMT ref: 6C826A59
                                                            • Part of subcall function 6C82AE09: __getptd.LIBCMT ref: 6C82AE18
                                                            • Part of subcall function 6C82AE09: __getptd.LIBCMT ref: 6C82AE26
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1602911419-0
                                                          • Opcode ID: 23fc156717ac283043d8d3ddd0d7991c516503ef23cefdfcd6fc4ef4fb8a87c1
                                                          • Instruction ID: 995ec07b8ea4abc8e6e33fe7c4baa9e65c0696354f0880f551c27208129a0cc9
                                                          • Opcode Fuzzy Hash: 23fc156717ac283043d8d3ddd0d7991c516503ef23cefdfcd6fc4ef4fb8a87c1
                                                          • Instruction Fuzzy Hash: 7511B4B1C006099FDB10DFA9C688BED7BB0FF04314F10886AE815A7750DB389A559BA0
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C82060F
                                                          • __CxxThrowException@8.LIBCMT ref: 6C820329
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • __CxxThrowException@8.LIBCMT ref: 6C820624
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: -an$7za
                                                          • API String ID: 3476068407-1592202885
                                                          • Opcode ID: 00e9ea22f61a9c18b0a81121983f0c0b0f2612dae5b7db1dcb10bb25605f6937
                                                          • Instruction ID: 57ac7843ed4f631bbec8d73ce65b73cc65ae12e1971737887422a4822a40edd1
                                                          • Opcode Fuzzy Hash: 00e9ea22f61a9c18b0a81121983f0c0b0f2612dae5b7db1dcb10bb25605f6937
                                                          • Instruction Fuzzy Hash: B1B17271905248EFDB20DFA8DA84BCEBBB4AF14308F104865E8057B745D775AA4DC7A2
                                                          APIs
                                                          • GetVersionExA.KERNEL32 ref: 1001A29B
                                                          • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 1001A2D0
                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1001A330
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: EnvironmentFileModuleNameVariableVersion
                                                          • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                          • API String ID: 1385375860-4131005785
                                                          • Opcode ID: 8d68a081adb5fb00688b35fa97c12b05e84aee0a2816abf6642aa1a3e48e784b
                                                          • Instruction ID: ff41b7170f7c9f9639ed0085cf635e38180a7bd29c628196ad01e98acd5c5e28
                                                          • Opcode Fuzzy Hash: 8d68a081adb5fb00688b35fa97c12b05e84aee0a2816abf6642aa1a3e48e784b
                                                          • Instruction Fuzzy Hash: DB310575C412986EEB61D6745C81BDD37E9DB17344F2400EAF195DE042E631DFC99B20
                                                          APIs
                                                          • __getptd.LIBCMT ref: 6C82AA4C
                                                            • Part of subcall function 6C8272BB: __getptd_noexit.LIBCMT ref: 6C8272BE
                                                            • Part of subcall function 6C8272BB: __amsg_exit.LIBCMT ref: 6C8272CB
                                                          • __getptd.LIBCMT ref: 6C82AA5D
                                                          • __getptd.LIBCMT ref: 6C82AA6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                          • String ID: MOC$csm
                                                          • API String ID: 803148776-1389381023
                                                          • Opcode ID: 66512fbb1fdfae65ddc3ab14898e2b81321cc8c81d018f826881ec3a7f1cfdf2
                                                          • Instruction ID: d49ac5c9374d8e80943dcf3decc3fd1b47b93b0e5477b65eccdd2d0df6353513
                                                          • Opcode Fuzzy Hash: 66512fbb1fdfae65ddc3ab14898e2b81321cc8c81d018f826881ec3a7f1cfdf2
                                                          • Instruction Fuzzy Hash: 82E01A715102048FC7209B69C648B9933A4FF45318F5519B5E54A87B22CB2CE4C89AD2
                                                          APIs
                                                          • GetStartupInfoA.KERNEL32(?), ref: 1001C793
                                                          • GetFileType.KERNEL32(00000480), ref: 1001C83E
                                                          • GetStdHandle.KERNEL32(-000000F6), ref: 1001C8A1
                                                          • GetFileType.KERNEL32(00000000), ref: 1001C8AF
                                                          • SetHandleCount.KERNEL32 ref: 1001C8E6
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: FileHandleType$CountInfoStartup
                                                          • String ID:
                                                          • API String ID: 1710529072-0
                                                          • Opcode ID: 96bd8d765951caf66320892a5d82298be417aadad03bc705412f471f5a66fdb5
                                                          • Instruction ID: 9e0b50c6418c78b4ce1b27a1f486aee3850f1a3a2b75f6582e04b96d90fbb996
                                                          • Opcode Fuzzy Hash: 96bd8d765951caf66320892a5d82298be417aadad03bc705412f471f5a66fdb5
                                                          • Instruction Fuzzy Hash: 0C51243190436A8FE710DB68C8C4F697BE0EB05768F354669D5A29F2E2DB30DC86CB51
                                                          APIs
                                                          • CharUpperW.USER32 ref: 100010C1
                                                          • GetLastError.KERNEL32 ref: 100010CD
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000004,00000000,00000000), ref: 100010E8
                                                          • CharUpperA.USER32(?), ref: 10001101
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,00000001), ref: 10001114
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Char$ByteMultiUpperWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3939315453-0
                                                          • Opcode ID: 8383e40484a713360037c6af6127c53484664dbcfb1822a6f6cfd995dd4f40d0
                                                          • Instruction ID: 5dd45f2d0006c2546d84b721a00360ca66f9a592c23ae8bd0920251664c2bfef
                                                          • Opcode Fuzzy Hash: 8383e40484a713360037c6af6127c53484664dbcfb1822a6f6cfd995dd4f40d0
                                                          • Instruction Fuzzy Hash: 210156B68002697BFB15EBE09CC9EDFB6ADEB082D4F110551FA42D3101E2B45D448770
                                                          APIs
                                                          • __getptd.LIBCMT ref: 6C82C0D2
                                                            • Part of subcall function 6C8272BB: __getptd_noexit.LIBCMT ref: 6C8272BE
                                                            • Part of subcall function 6C8272BB: __amsg_exit.LIBCMT ref: 6C8272CB
                                                          • __amsg_exit.LIBCMT ref: 6C82C0F2
                                                          • __lock.LIBCMT ref: 6C82C102
                                                          • InterlockedDecrement.KERNEL32(?), ref: 6C82C11F
                                                          • InterlockedIncrement.KERNEL32(02731658), ref: 6C82C14A
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                          • String ID:
                                                          • API String ID: 4271482742-0
                                                          • Opcode ID: 7293e2fbcf98022f5f97bd4840bdf58ca9c86c1aa14f7885632ace301edd8e58
                                                          • Instruction ID: fee5a6de84cb6ba1987b155c24fbb338e44918ba077f7956326d65a71fa895e3
                                                          • Opcode Fuzzy Hash: 7293e2fbcf98022f5f97bd4840bdf58ca9c86c1aa14f7885632ace301edd8e58
                                                          • Instruction Fuzzy Hash: 2301A532A12A119BEB31ABA9860939D7670BF0171CF111D26E814A7F81CB3CD9C5DBD1
                                                          APIs
                                                          • __lock.LIBCMT ref: 6C826012
                                                            • Part of subcall function 6C8281D4: __mtinitlocknum.LIBCMT ref: 6C8281EA
                                                            • Part of subcall function 6C8281D4: __amsg_exit.LIBCMT ref: 6C8281F6
                                                            • Part of subcall function 6C8281D4: EnterCriticalSection.KERNEL32(?,?,?,6C82C6AB,00000004,6C8382E8,0000000C,6C827669,6C80FA7E,?,00000000,00000000,00000000,?,6C82726D,00000001), ref: 6C8281FE
                                                          • ___sbh_find_block.LIBCMT ref: 6C82601D
                                                          • ___sbh_free_block.LIBCMT ref: 6C82602C
                                                          • HeapFree.KERNEL32(00000000,6C80FA7E,6C837EB0,0000000C,6C8281B5,00000000,6C838028,0000000C,6C8281EF,6C80FA7E,?,?,6C82C6AB,00000004,6C8382E8,0000000C), ref: 6C82605C
                                                          • GetLastError.KERNEL32(?,6C82C6AB,00000004,6C8382E8,0000000C,6C827669,6C80FA7E,?,00000000,00000000,00000000,?,6C82726D,00000001,00000214), ref: 6C82606D
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                          • String ID:
                                                          • API String ID: 2714421763-0
                                                          • Opcode ID: e223ccb61ef53e6b2370fc246ba5186f1f4204463c2f28255d439d70eb015966
                                                          • Instruction ID: 147978984bc2666eaac7ae7f0a0ed02a6765dc49cee18407bfd78fd171fdae04
                                                          • Opcode Fuzzy Hash: e223ccb61ef53e6b2370fc246ba5186f1f4204463c2f28255d439d70eb015966
                                                          • Instruction Fuzzy Hash: 200171B1905211EBEF355BBA9A0CB8E7B74AF0136CF104D25E514E6A80CB3C95C4EAD1
                                                          APIs
                                                          • GetLastError.KERNEL32(00000103,7FFFFFFF,1001C473,1001D0D7,00000000,?,?,00000000,00000001), ref: 1001C033
                                                          • TlsGetValue.KERNEL32 ref: 1001C041
                                                          • SetLastError.KERNEL32(00000000), ref: 1001C08D
                                                            • Part of subcall function 1001C480: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,10019E24,10021318,000000FF,?,1001C056,00000001,00000074), ref: 1001C576
                                                          • TlsSetValue.KERNEL32(00000000), ref: 1001C065
                                                          • GetCurrentThreadId.KERNEL32 ref: 1001C076
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue$AllocCurrentHeapThread
                                                          • String ID:
                                                          • API String ID: 2020098873-0
                                                          • Opcode ID: 2a7b4345b55e60806f6563897d190d9d6c15b8e2791512da656746999b9ff8e8
                                                          • Instruction ID: c7b26c2ea065f329baa6dbda2ade13875997561f4633f5fb0c8b07fada39eb07
                                                          • Opcode Fuzzy Hash: 2a7b4345b55e60806f6563897d190d9d6c15b8e2791512da656746999b9ff8e8
                                                          • Instruction Fuzzy Hash: 0DF0BB35901331DBF2329B749C89F1A3AA6EF097B1F214318F6559E1A1CB30D8C29690
                                                          APIs
                                                          • DeleteCriticalSection.KERNEL32(00000000,?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A102
                                                            • Part of subcall function 100189EE: HeapFree.KERNEL32(00000000,?,?,?,?), ref: 10018AC2
                                                          • DeleteCriticalSection.KERNEL32(?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A11D
                                                          • DeleteCriticalSection.KERNEL32 ref: 1001A125
                                                          • DeleteCriticalSection.KERNEL32 ref: 1001A12D
                                                          • DeleteCriticalSection.KERNEL32 ref: 1001A135
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalDeleteSection$FreeHeap
                                                          • String ID:
                                                          • API String ID: 447823528-0
                                                          • Opcode ID: 31fd23f1ab8c03e9a7f37bef3c6a7256c8a93bd33ca8f004c8e74067c6c1dcf0
                                                          • Instruction ID: 436f94670acdd869086ea8be0b95e1bb75b4415bd69928cd2107d9a27a45b4f1
                                                          • Opcode Fuzzy Hash: 31fd23f1ab8c03e9a7f37bef3c6a7256c8a93bd33ca8f004c8e74067c6c1dcf0
                                                          • Instruction Fuzzy Hash: 1AF0F4268002647AEA65F719AD8C8A97BD5DB822B27920476EC53B7030CD778CC29DA5
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C82109D
                                                            • Part of subcall function 6C81F640: __CxxThrowException@8.LIBCMT ref: 6C81F66A
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C818324
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C818390
                                                            • Part of subcall function 6C8182B0: _malloc.LIBCMT ref: 6C8183B1
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C8183CB
                                                            • Part of subcall function 6C8182B0: __CxxThrowException@8.LIBCMT ref: 6C818416
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$_malloc
                                                          • String ID: -mhe$ -w$7za d
                                                          • API String ID: 175252994-4051784903
                                                          • Opcode ID: 0c5f91b450cb7b7c20f18daab7eb4133857f1d7ca5e2785c8499f282b8ec27f7
                                                          • Instruction ID: 107832ed9189e1d9fbb43884f09c0d0d5294a09cb858ae0712b4036fbb89ec07
                                                          • Opcode Fuzzy Hash: 0c5f91b450cb7b7c20f18daab7eb4133857f1d7ca5e2785c8499f282b8ec27f7
                                                          • Instruction Fuzzy Hash: DB919371905248EFDB20DBE8CA44BCEBBB4AF54308F144868E805BB745D775AE4DCBA1
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C802893
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8028BD
                                                          Strings
                                                          • Incorrect item in listfile.Check charset encoding and -scs switch., xrefs: 6C8028B6
                                                          • Cannot find listfile, xrefs: 6C80288C, 6C8028B5
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Cannot find listfile$Incorrect item in listfile.Check charset encoding and -scs switch.
                                                          • API String ID: 3476068407-2427230106
                                                          • Opcode ID: 1607b6c1ff1edd4ba8eae73d97a8ea41292e6c4c81e5631003b5d666bc977066
                                                          • Instruction ID: c8164d46d83b04e418b4175a7567fcfa854d93b5ffcc29df68da86855860ccbf
                                                          • Opcode Fuzzy Hash: 1607b6c1ff1edd4ba8eae73d97a8ea41292e6c4c81e5631003b5d666bc977066
                                                          • Instruction Fuzzy Hash: 1431A875D0426A9BCB20CFD9CE44AEFB7B8FF48304F440A69E914A3B40D77559098BE1
                                                          APIs
                                                          • RegOpenKeyExW.ADVAPI32(80000001,Software\7-zip,00000000,00020019,6C82FD48,0FD3DAC1,00000000,?,80000001,00000000,6C82FD48,000000FF,?,6C815DBD,?,6C83FCC8), ref: 6C815C1D
                                                            • Part of subcall function 6C812FE0: RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6C815DBD,?,?,6C815C37,?,6C815DBD,?,6C83FCC8,00000000,00000000), ref: 6C81300E
                                                            • Part of subcall function 6C812FE0: RegQueryValueExW.ADVAPI32(6C815DBD,Path,00000000,6C815DBD,?,6C815DBD,?,6C815DBD,?,6C83FCC8,00000000,00000000), ref: 6C81304E
                                                          • RegCloseKey.ADVAPI32(?,?,6C815DBD,?,6C83FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6C815C47
                                                          • RegCloseKey.ADVAPI32(?,?,6C815DBD,?,6C83FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6C815C65
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$Open
                                                          • String ID: Software\7-zip
                                                          • API String ID: 4082589901-3321436535
                                                          • Opcode ID: bf95e8d527aa50520114a5be338c863f64c733b37ee7ef81c5049c595caa1335
                                                          • Instruction ID: cd2b4d01b3c4bab9dc1af40ed91f8d463ed8a31ec90d9a78f2ca88e1abf3411a
                                                          • Opcode Fuzzy Hash: bf95e8d527aa50520114a5be338c863f64c733b37ee7ef81c5049c595caa1335
                                                          • Instruction Fuzzy Hash: CF117772A09A25ABC7318F85DD44AEFBBB8FB05B25F010E6BF815A7B00D7385905C6D4
                                                          APIs
                                                          • ___BuildCatchObject.LIBCMT ref: 6C82B0A3
                                                            • Part of subcall function 6C82AFFE: ___BuildCatchObjectHelper.LIBCMT ref: 6C82B034
                                                          • _UnwindNestedFrames.LIBCMT ref: 6C82B0BA
                                                          • ___FrameUnwindToState.LIBCMT ref: 6C82B0C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                          • String ID: csm
                                                          • API String ID: 2163707966-1018135373
                                                          • Opcode ID: 140d385d04fdb06c5864635da4643ae5f7030d20822db344ff7144d47db4523a
                                                          • Instruction ID: 9edce972271ec594ddab3f8adbd6042ec7e777eefc9c00f3c77ef856027b7e6e
                                                          • Opcode Fuzzy Hash: 140d385d04fdb06c5864635da4643ae5f7030d20822db344ff7144d47db4523a
                                                          • Instruction Fuzzy Hash: 1D012871002109BBDF225F55CE48EEB7F6AEF04348F004820BD2954660DB3A98A5DBE5
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81F66A
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExceptionException@8RaiseThrow
                                                          • String ID: -r$ -r-$ -r0
                                                          • API String ID: 3976011213-1696425382
                                                          • Opcode ID: 8f7886a3164b2465c2d5f9595165047ab743a1f3450cd5a9b04d802eb167c28c
                                                          • Instruction ID: b6be8bfa9fa2cc3b8e3027fb2688be3a901f58fdc9003bdb84280e8cc17effd7
                                                          • Opcode Fuzzy Hash: 8f7886a3164b2465c2d5f9595165047ab743a1f3450cd5a9b04d802eb167c28c
                                                          • Instruction Fuzzy Hash: 77F0E53074A12A67C6329AACAF05B9D73DCC751509F002EB5B80CE7F10D7768E1453C9
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fd9724b1c61d381fd748c7ffe039d77dfbf158c8da40872393acd8e509287be1
                                                          • Instruction ID: c5e9eab5286596022c0fc86455b854ac72cbfdbbf2fd81343e62aa3bf37372db
                                                          • Opcode Fuzzy Hash: fd9724b1c61d381fd748c7ffe039d77dfbf158c8da40872393acd8e509287be1
                                                          • Instruction Fuzzy Hash: 7791C371D01664AADB11EB68CC81ADE7AF9EF497A0F600226F854BE191D731DDC0CBA1
                                                          APIs
                                                          • HeapAlloc.KERNEL32(00000000,00002020,10025958,10025958,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B031
                                                          • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B055
                                                          • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B06F
                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?,?), ref: 1001B130
                                                          • HeapFree.KERNEL32(00000000,00000000,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?,?,?), ref: 1001B147
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual$FreeHeap
                                                          • String ID:
                                                          • API String ID: 714016831-0
                                                          • Opcode ID: 08a6be7fdf41f6db4eaa31ea6addab7da968f7782194b53cc123b6d70fe20246
                                                          • Instruction ID: 9791cdc1e8676e8be9240cb2db72b85fdf48b460ca22e9baef45e6ba91bfb517
                                                          • Opcode Fuzzy Hash: 08a6be7fdf41f6db4eaa31ea6addab7da968f7782194b53cc123b6d70fe20246
                                                          • Instruction Fuzzy Hash: F4312670500B56EBE332CF24CCC5B2677E0EB447A5FA14529F5669B290E771E8C5CB48
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bd452fdbcd20819e7acf28046b49b556f8cdc01f53c7287b2890f695edbef064
                                                          • Instruction ID: 84e489207bef531c365d525be471745bbacebba05fa2548dcb90b5661a358df9
                                                          • Opcode Fuzzy Hash: bd452fdbcd20819e7acf28046b49b556f8cdc01f53c7287b2890f695edbef064
                                                          • Instruction Fuzzy Hash: ABC19571E0410ADFCB20CF98CA80ADEB7B5FF59318F248A69D815AB750D731A955CBD0
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6C82CEDC
                                                          • __isleadbyte_l.LIBCMT ref: 6C82CF10
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,?,?,00000000,?,?,?), ref: 6C82CF41
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,00000001,?,00000000,?,?,?), ref: 6C82CFAF
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 8026d36c8c9a3f6c685174c26a8acce538d3f1f96c8bbaeb3b6a61efc0bc52d3
                                                          • Instruction ID: 85c41a9b80b1c5c2df8d32d5c398edba310a110276cdcc67b8b285e653a36b46
                                                          • Opcode Fuzzy Hash: 8026d36c8c9a3f6c685174c26a8acce538d3f1f96c8bbaeb3b6a61efc0bc52d3
                                                          • Instruction Fuzzy Hash: FE31D530605245EFEB30EF68C9489BA3BB5BF05314F244D68E4649B592D374C980CBD0
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,40000000,00000003,00000000,00000003,02000000,00000000,0FD3DAC1,00000000,?,?,00000000,00000000,00000000), ref: 6C810FAE
                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 6C81100C
                                                          • SetFileTime.KERNEL32(00000000,?,?,?,?,?,?), ref: 6C811033
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 6C81103F
                                                            • Part of subcall function 6C8128A0: GetCurrentDirectoryW.KERNEL32(00000105,?,0FD3DAC1,FFFFFFFF,?,00000004), ref: 6C812994
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: File$Create$CloseCurrentDirectoryHandleTime
                                                          • String ID:
                                                          • API String ID: 2622452211-0
                                                          • Opcode ID: cdef3a9e9baff49397567c654c92ea91285098a96403b3be0cba0af2f3e2c581
                                                          • Instruction ID: c09c93328f061ae6d3e52ae1e78e326b8baf337af8055e9e7da975aeddcac686
                                                          • Opcode Fuzzy Hash: cdef3a9e9baff49397567c654c92ea91285098a96403b3be0cba0af2f3e2c581
                                                          • Instruction Fuzzy Hash: 0D21B571A00205AFEB20CF94DD85FAFB7B8EB45768F104629F914A76C0D738AE05C6A0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CharUpper$ErrorH_prologLast
                                                          • String ID:
                                                          • API String ID: 826227211-0
                                                          • Opcode ID: ff1246a03657b54eff9156cf09a95992e04e2b4fa534e0be7897412a772be6bf
                                                          • Instruction ID: 99cf40d06858b6207db1331b5053b1e25ae539a9e8e767eb293be6f8fe8ea0fc
                                                          • Opcode Fuzzy Hash: ff1246a03657b54eff9156cf09a95992e04e2b4fa534e0be7897412a772be6bf
                                                          • Instruction Fuzzy Hash: 8A11043590025BDFEB05EFA0D8919EEB7F4FF09384F200424F542A2269EB705E41CB80
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(6C83FC98,0FD3DAC1,?,?,?,6C82FB68,000000FF), ref: 6C81D4F2
                                                          • LeaveCriticalSection.KERNEL32(6C83FC98,?,?,?,6C82FB68,000000FF), ref: 6C81D50A
                                                          • LeaveCriticalSection.KERNEL32(6C83FC98,?,?,?,?,6C82FB68,000000FF), ref: 6C81D547
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$Enter
                                                          • String ID: [Content]
                                                          • API String ID: 2978645861-3799411330
                                                          • Opcode ID: da443c251224b5d9da81c2af1e42f539807294302ca3d41263c3d808fd8529d1
                                                          • Instruction ID: 52fc3cf1c7e4447899d03428ecca7c8247814dca37fb7da724a413b57d8b0754
                                                          • Opcode Fuzzy Hash: da443c251224b5d9da81c2af1e42f539807294302ca3d41263c3d808fd8529d1
                                                          • Instruction Fuzzy Hash: D401C232904524EFC7318F88CA05B9AB7F8F705614F815E6BE80997B80D7786904CBD0
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6,?,00100000,?,00000000), ref: 6C801A4E
                                                          • ReadFile.KERNEL32(00000000), ref: 6C801A55
                                                          • GetLastError.KERNEL32 ref: 6C801A72
                                                          • GetLastError.KERNEL32 ref: 6C801A80
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$FileHandleRead
                                                          • String ID:
                                                          • API String ID: 2244327787-0
                                                          • Opcode ID: e06d3b669e9cd036d02e5291c56334893eecb75ff32c2a6c0faf89801d08a789
                                                          • Instruction ID: e003d4b76c48d23a27293e721a58a4b59fc8d59bb3351b71bc17a743b7aefe56
                                                          • Opcode Fuzzy Hash: e06d3b669e9cd036d02e5291c56334893eecb75ff32c2a6c0faf89801d08a789
                                                          • Instruction Fuzzy Hash: 5401AD3330020A9BDB20CA949E41BB733ACAB44379F10893AF906C7A80D634DC5187A0
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C80EF8A
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80EFA4
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • std::exception::exception.LIBCMT ref: 6C80EFC3
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80EFD8
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1974103008-0
                                                          • Opcode ID: 21c11b474ee6ccc0ec03f5fe2bfeb78bf4591342bc187130f4b4e0f94dc1b106
                                                          • Instruction ID: 087d3e70df8b95d00f491be61fd21b694b92c85be6212397a5e70f3bb3bc4666
                                                          • Opcode Fuzzy Hash: 21c11b474ee6ccc0ec03f5fe2bfeb78bf4591342bc187130f4b4e0f94dc1b106
                                                          • Instruction Fuzzy Hash: CDF028B1D042056AD728DBF89F44BEFB7395B84304F048EBAD445D1A44EB78865D82E1
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C8159D3
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8159ED
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • std::exception::exception.LIBCMT ref: 6C815A0C
                                                          • __CxxThrowException@8.LIBCMT ref: 6C815A21
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1974103008-0
                                                          • Opcode ID: d8e5966e8113aff092806af576a0eac4f135f18a5206db5d89348f498587aee9
                                                          • Instruction ID: 5fbd1420ab190b87658e9dd80855c5b7aa748b0ffb9ce669651dfa4354433aa2
                                                          • Opcode Fuzzy Hash: d8e5966e8113aff092806af576a0eac4f135f18a5206db5d89348f498587aee9
                                                          • Instruction Fuzzy Hash: B9F0F6B180830A66DB24DAE89B45EEFB7785B40718F005E6AD405E2E84EB74975D82E2
                                                          APIs
                                                          • _malloc.LIBCMT ref: 6C80F320
                                                            • Part of subcall function 6C825F2A: __FF_MSGBANNER.LIBCMT ref: 6C825F4D
                                                            • Part of subcall function 6C825F2A: __NMSG_WRITE.LIBCMT ref: 6C825F54
                                                            • Part of subcall function 6C825F2A: RtlAllocateHeap.NTDLL(00000000,6C80FA6F,?,00000000,?,?,6C804D3F,0000000C,0FD3DAC1,?,?,00000000,?,?,6C82EF9B,000000FF), ref: 6C825FA1
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80F33A
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • std::exception::exception.LIBCMT ref: 6C80F359
                                                          • __CxxThrowException@8.LIBCMT ref: 6C80F36E
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AllocateExceptionHeapRaise_mallocstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1974103008-0
                                                          • Opcode ID: d0b74dbcb94f78d5848714b21b193cdb78434fa3df504ab8755ee4b0c16ad45a
                                                          • Instruction ID: 2ff25df2cbf764498c39e3b2eeefaff7c4ab98deae55aa8a8356689adfd0c7d5
                                                          • Opcode Fuzzy Hash: d0b74dbcb94f78d5848714b21b193cdb78434fa3df504ab8755ee4b0c16ad45a
                                                          • Instruction Fuzzy Hash: EFF0F6B09042087ACB28DFB8DB45ADE77689F10318F00CE2EEC1982A44FB74D79886D5
                                                          APIs
                                                          • __getptd.LIBCMT ref: 6C82BE36
                                                            • Part of subcall function 6C8272BB: __getptd_noexit.LIBCMT ref: 6C8272BE
                                                            • Part of subcall function 6C8272BB: __amsg_exit.LIBCMT ref: 6C8272CB
                                                          • __getptd.LIBCMT ref: 6C82BE4D
                                                          • __amsg_exit.LIBCMT ref: 6C82BE5B
                                                          • __lock.LIBCMT ref: 6C82BE6B
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                          • String ID:
                                                          • API String ID: 3521780317-0
                                                          • Opcode ID: cd6d0b2d1a91f10c8ad2bdf14c25f52a8385545c0ebfb0c9f9a52695c7f31ea9
                                                          • Instruction ID: 3bf5cb806c440bb921afa48417b7d99e324c51a6f225eb2f08bf818fbe254081
                                                          • Opcode Fuzzy Hash: cd6d0b2d1a91f10c8ad2bdf14c25f52a8385545c0ebfb0c9f9a52695c7f31ea9
                                                          • Instruction Fuzzy Hash: 80F06236901B008ADB309BA9C60879D72A0AF01728F145D7AD65297B90CB3C65C5CBD2
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: H_prolog
                                                          • String ID: $
                                                          • API String ID: 3519838083-227171996
                                                          • Opcode ID: 312c2aec7e709d08ccb2c85a8bc715850654904397243e69b9c15c2e37b53766
                                                          • Instruction ID: 9585d42676a0d41e953fe7fe136552d86f024f2135ab78c93d006785aed77b76
                                                          • Opcode Fuzzy Hash: 312c2aec7e709d08ccb2c85a8bc715850654904397243e69b9c15c2e37b53766
                                                          • Instruction Fuzzy Hash: D471583090060ACFEB20CF94C881AAEB7B1FF88394F50456DD596A7255DB30BB86CF50
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81FD8E
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81FDA3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw
                                                          • String ID: -u
                                                          • API String ID: 2005118841-3343466670
                                                          • Opcode ID: 2e4f0db6438b43e39a9ba3dac7075d256bb8f64c1001e9b84e09472e2caae8d9
                                                          • Instruction ID: 83df16ee1b597372c676828ffe1c9df580cc6343bab1b9639f294222006187f3
                                                          • Opcode Fuzzy Hash: 2e4f0db6438b43e39a9ba3dac7075d256bb8f64c1001e9b84e09472e2caae8d9
                                                          • Instruction Fuzzy Hash: 5C419F71918229EBCB30CFD8CB40ADEB7F5AB15358F109D2AE808A7F40D7349A449BD1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Info
                                                          • String ID: $
                                                          • API String ID: 1807457897-3032137957
                                                          • Opcode ID: 14eba8f351f7a606bf476568831cf335b29103052037c0e04881c2f51051340a
                                                          • Instruction ID: 27a1dab1f5f815cb8d427bf576b62c8b4ec6ff9cec70f847aa7466e11b016868
                                                          • Opcode Fuzzy Hash: 14eba8f351f7a606bf476568831cf335b29103052037c0e04881c2f51051340a
                                                          • Instruction Fuzzy Hash: 2B41483140436C1AEB11FA64CD85FEA7F9ADB01744F1006F7D585CF092D271C989DBA2
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throwwsprintf
                                                          • String ID: -v
                                                          • API String ID: 2898814609-1581256980
                                                          • Opcode ID: 25d2cf8dc7aae2eff97380f238788f7059a3a551d035478f5f65880a0b264894
                                                          • Instruction ID: 971d4bc456e525bbbb4a4f89c734c1e2470e52cc832eaffa80edaa4ed4a1307b
                                                          • Opcode Fuzzy Hash: 25d2cf8dc7aae2eff97380f238788f7059a3a551d035478f5f65880a0b264894
                                                          • Instruction Fuzzy Hash: 5B315271D002589FCB20DFE9CA44ADEFBF8EF44704F10492AE419AB745E7755A088B90
                                                          APIs
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,0000005F,00000000,0FD3DAC1,00000000), ref: 6C810B62
                                                          • __CxxThrowException@8.LIBCMT ref: 6C810B88
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ByteCharExceptionException@8MultiRaiseThrowWide
                                                          • String ID: _
                                                          • API String ID: 3144726602-701932520
                                                          • Opcode ID: d24e88072e0bd9e80e26402d6fe1b2a83b297a2998235b8e52a45ce4f71699cf
                                                          • Instruction ID: 34bd070d59fe9f8f29bab582e5e4370156aa0fd44bd7bc748bf31c8b5a13a4bc
                                                          • Opcode Fuzzy Hash: d24e88072e0bd9e80e26402d6fe1b2a83b297a2998235b8e52a45ce4f71699cf
                                                          • Instruction Fuzzy Hash: A9219271504249EFCB10CF99C980F9AFBF8EF49718F10896AE914DB741D775AA04CBA0
                                                          APIs
                                                          • RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6C815DBD,?,?,6C815C37,?,6C815DBD,?,6C83FCC8,00000000,00000000), ref: 6C81300E
                                                          • RegQueryValueExW.ADVAPI32(6C815DBD,Path,00000000,6C815DBD,?,6C815DBD,?,6C815DBD,?,6C83FCC8,00000000,00000000), ref: 6C81304E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: QueryValue
                                                          • String ID: Path
                                                          • API String ID: 3660427363-2875597873
                                                          • Opcode ID: 9af597221bf430df2ea575119147234c64ebb3b81e1e46046d624afd3b6a1688
                                                          • Instruction ID: 69f51f5fdad0202228fc1e155e159895531d1128131f52ad6512775d087d518d
                                                          • Opcode Fuzzy Hash: 9af597221bf430df2ea575119147234c64ebb3b81e1e46046d624afd3b6a1688
                                                          • Instruction Fuzzy Hash: 8A1163B1A09605AFDB24DFA9C9C085EF7F9FF48704B209D7EE146D3A00E6709D448B50
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C81C8C2
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • GetLastError.KERNEL32(00000000,00000000), ref: 6C81C8C7
                                                          Strings
                                                          • 7-Zip cannot load Mapi32.dll, xrefs: 6C81C8D2
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ErrorExceptionException@8LastRaiseThrow
                                                          • String ID: 7-Zip cannot load Mapi32.dll
                                                          • API String ID: 2060628206-1691247220
                                                          • Opcode ID: e4830f39c532c51ae353f1ff5db13426a2560d0fd04ec358073989e4c8fc6aed
                                                          • Instruction ID: 301cc9808909ab16c49ac6841bcfab00c187ce5ddadfc2566bd09ec64e1763ec
                                                          • Opcode Fuzzy Hash: e4830f39c532c51ae353f1ff5db13426a2560d0fd04ec358073989e4c8fc6aed
                                                          • Instruction Fuzzy Hash: 5111C872A05248EFEB20DBE8DE04FDDB7B4AF44314F1445ACE50897780DB355A08CBA2
                                                          APIs
                                                            • Part of subcall function 6C8269BB: __getptd.LIBCMT ref: 6C8269C1
                                                            • Part of subcall function 6C8269BB: __getptd.LIBCMT ref: 6C8269D1
                                                          • __getptd.LIBCMT ref: 6C82AE18
                                                            • Part of subcall function 6C8272BB: __getptd_noexit.LIBCMT ref: 6C8272BE
                                                            • Part of subcall function 6C8272BB: __amsg_exit.LIBCMT ref: 6C8272CB
                                                          • __getptd.LIBCMT ref: 6C82AE26
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                          • String ID: csm
                                                          • API String ID: 803148776-1018135373
                                                          • Opcode ID: c868b9202c40c128ab5c124d4baf2a7191ffbd882dd3f7671e77d16ed862952d
                                                          • Instruction ID: 3b3d377774d450d9fbf6a78d398c06179983fd6ec068fd6bd8291d93572cb575
                                                          • Opcode Fuzzy Hash: c868b9202c40c128ab5c124d4baf2a7191ffbd882dd3f7671e77d16ed862952d
                                                          • Instruction Fuzzy Hash: 65014B78801605ABCB349FA6DA487DDB3B5AF00219F244D2DD4419AEA0CF3995CADFD1
                                                          APIs
                                                          • __CxxThrowException@8.LIBCMT ref: 6C82E66F
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          • std::bad_exception::bad_exception.LIBCMT ref: 6C82E697
                                                            • Part of subcall function 6C825DCA: std::bad_exception::bad_exception.LIBCMT ref: 6C825DD5
                                                          Strings
                                                          • Access violation - no RTTI data!, xrefs: 6C82E68F
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: std::bad_exception::bad_exception$ExceptionException@8RaiseThrow
                                                          • String ID: Access violation - no RTTI data!
                                                          • API String ID: 1432139112-2158758863
                                                          • Opcode ID: 60e9f9c619c7eb4d9014e9c6bd24b4570943771b3d332f6ea9cfe9ce4432865b
                                                          • Instruction ID: c77b8960dc50d8e418550f1c7c5ba83d88de9fa2fa5773b33e2a5d31ee7d6153
                                                          • Opcode Fuzzy Hash: 60e9f9c619c7eb4d9014e9c6bd24b4570943771b3d332f6ea9cfe9ce4432865b
                                                          • Instruction Fuzzy Hash: 79E08C71900209CFCB10CBA8CA84EDD73B0AB09306F011C28E402E3B50C738A990DF94
                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 6C825196
                                                          • __CxxThrowException@8.LIBCMT ref: 6C8251C1
                                                            • Part of subcall function 6C82663B: RaiseException.KERNEL32(?,6C820629,0FD3DAC1,?,?,6C820629,?,6C838388,0FD3DAC1), ref: 6C82667D
                                                          Strings
                                                          • invalid string position, xrefs: 6C82519B
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2330198245.000000006C801000.00000020.00000001.01000000.00000005.sdmp, Offset: 6C800000, based on PE: true
                                                          • Associated: 00000001.00000002.2330172715.000000006C800000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330334441.000000006C833000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330379770.000000006C83D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C843000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330408977.000000006C868000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_6c800000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                          • String ID: invalid string position
                                                          • API String ID: 1961742612-1799206989
                                                          • Opcode ID: 6ecd05328b74946e72903da3b3d14934723cf8aa12c4ebf3678d35971cd059d5
                                                          • Instruction ID: 9e90d2fca59387b8212174441ab0792f11d3dea2be581fddde69997e5d0b8881
                                                          • Opcode Fuzzy Hash: 6ecd05328b74946e72903da3b3d14934723cf8aa12c4ebf3678d35971cd059d5
                                                          • Instruction Fuzzy Hash: 1FD012718501289BCB20DBD8CE48FDD7338AB14315F401C359105E6A80DB789A4C87E4
                                                          APIs
                                                          • HeapReAlloc.KERNEL32(00000000,?,?,00000000,1001A936,?,?,?,10018906,?,?,?,?,?,?), ref: 1001AB96
                                                          • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,1001A936,?,?,?,10018906,?,?,?,?,?,?), ref: 1001ABCA
                                                          • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 1001ABE4
                                                          • HeapFree.KERNEL32(00000000,?), ref: 1001ABFB
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: AllocHeap$FreeVirtual
                                                          • String ID:
                                                          • API String ID: 3499195154-0
                                                          • Opcode ID: 6f699eca9e893f575dde21e6c4b4ec1254527531fada708ecaea67c30c461b13
                                                          • Instruction ID: 484c1ce75c38baac158856a15f7ab205fd40ab6127819ea80900b3ceb95b3c03
                                                          • Opcode Fuzzy Hash: 6f699eca9e893f575dde21e6c4b4ec1254527531fada708ecaea67c30c461b13
                                                          • Instruction Fuzzy Hash: E8112570240321AFE721EF19CCC6A167BF6FB86764B61491AF552C69B1D3729CA2CF40
                                                          APIs
                                                          • InitializeCriticalSection.KERNEL32(?,1001BFB2,?,10019F53), ref: 1001A0B2
                                                          • InitializeCriticalSection.KERNEL32 ref: 1001A0BA
                                                          • InitializeCriticalSection.KERNEL32 ref: 1001A0C2
                                                          • InitializeCriticalSection.KERNEL32 ref: 1001A0CA
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.2329950893.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000001.00000002.2329919909.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330049484.0000000010020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330082510.0000000010025000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330108430.0000000010027000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000001.00000002.2330141009.000000001002F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_10000000_cfrv_4_0_setup_ALL.jbxd
                                                          Similarity
                                                          • API ID: CriticalInitializeSection
                                                          • String ID:
                                                          • API String ID: 32694325-0
                                                          • Opcode ID: 9eddfc3165ec3fc15766a975bd316014652016b7c432d0d5cadee5ee0f614abc
                                                          • Instruction ID: bb73eb11f573fb0f18e311b5dd9e76b2e5dde51fe535fe889abf8312516ef5db
                                                          • Opcode Fuzzy Hash: 9eddfc3165ec3fc15766a975bd316014652016b7c432d0d5cadee5ee0f614abc
                                                          • Instruction Fuzzy Hash: BEC00231801138AFFA556B55DC848493FA6EB042723210063E10561030CEB31C93DFE8