Analysis

  • max time kernel
    300s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-10-2024 09:55

General

  • Target

    https://mahr.canto.global/s/SMEPL?viewIndex=0

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Drops file in Drivers directory 4 IoCs
  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 32 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 36 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 3 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://mahr.canto.global/s/SMEPL?viewIndex=0"
    1⤵
      PID:1020
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2664
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:2824
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4864
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4600
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4868
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4692
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1272
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3456
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3000
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_MarConnect--MarCom Professional--4103401--SW--DE-EN--v5.4-01.20241009180714518.20241009180714518.zip\MarComVersion.TXT
        1⤵
          PID:1920
        • C:\Users\Admin\Downloads\MarConnect--MarCom Professional--4103401--SW--DE-EN--v5.4-01.20241009180714518.20241009180714518\S e t u p-MarCom.exe
          "C:\Users\Admin\Downloads\MarConnect--MarCom Professional--4103401--SW--DE-EN--v5.4-01.20241009180714518.20241009180714518\S e t u p-MarCom.exe"
          1⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:752
          • C:\Users\Admin\AppData\Local\Temp\SetUp-MarCom.exe
            "C:\Users\Admin\AppData\Local\Temp\SetUp-MarCom.exe"
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2876
            • C:\Users\Admin\AppData\Local\Temp\is-NP6HK.tmp\SetUp-MarCom.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-NP6HK.tmp\SetUp-MarCom.tmp" /SL5="$20452,85763104,117248,C:\Users\Admin\AppData\Local\Temp\SetUp-MarCom.exe"
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1428
              • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\FtdiPreinstall32.exe
                "C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\FtdiPreinstall32.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:752
                • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\FtdiPreinstall64.exe
                  "C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\FtdiPreinstall64.exe"
                  5⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Checks SCSI registry key(s)
                  PID:2848
              • C:\Program Files (x86)\MarCom\Driver\AntUSB2\AntPreinstall32.exe
                "C:\Program Files (x86)\MarCom\Driver\AntUSB2\AntPreinstall32.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3876
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c regedit /s AntDriverCtrlFlags_QuietInstall.reg
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2856
                  • C:\Windows\SysWOW64\regedit.exe
                    regedit /s AntDriverCtrlFlags_QuietInstall.reg
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Runs .reg file with regedit
                    PID:2820
                • C:\Program Files (x86)\MarCom\Driver\AntUSB2\AntPreinstall64.exe
                  "C:\Program Files (x86)\MarCom\Driver\AntUSB2\AntPreinstall64.exe"
                  5⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Checks SCSI registry key(s)
                  • Suspicious use of WriteProcessMemory
                  PID:3764
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c regedit /s AntDriverCtrlFlags_QuietInstall.reg
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4804
                    • C:\Windows\regedit.exe
                      regedit /s AntDriverCtrlFlags_QuietInstall.reg
                      7⤵
                      • Runs .reg file with regedit
                      PID:4020
              • C:\Program Files (x86)\MarCom\Driver\dotNetFx40_Client_x86_x64.exe
                "C:\Program Files (x86)\MarCom\Driver\dotNetFx40_Client_x86_x64.exe" /q
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1400
                • F:\04759164cb881f02f0fe5b7dca\Setup.exe
                  F:\04759164cb881f02f0fe5b7dca\\Setup.exe /q /x86 /x64
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4940
              • C:\Program Files (x86)\MarCom\Driver\BlueDat\blueDAT_win32\vc_redist.x86.exe
                "C:\Program Files (x86)\MarCom\Driver\BlueDat\blueDAT_win32\vc_redist.x86.exe" /passive /norestart
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\Program Files (x86)\MarCom\Driver\BlueDat\blueDAT_win32\vc_redist.x86.exe
                  "C:\Program Files (x86)\MarCom\Driver\BlueDat\blueDAT_win32\vc_redist.x86.exe" /passive /norestart -burn.unelevated BurnPipe.{85D82D8D-29C4-4C69-99E3-554784334BCC} {F654B1D0-4BD1-4AF6-9DA5-854E8FFEDCF9} 2888
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:4596
              • C:\Program Files (x86)\MarCom\Driver\BlueDat\blueDAT_dongle_driver\windrv\dpinst_amd64.exe
                "C:\Program Files (x86)\MarCom\Driver\BlueDat\blueDAT_dongle_driver\windrv\dpinst_amd64.exe"
                4⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                PID:4300
              • C:\Program Files (x86)\MarCom\Driver\Steute\CP210xVCPInstaller_x64.exe
                "C:\Program Files (x86)\MarCom\Driver\Steute\CP210xVCPInstaller_x64.exe" /SE /S
                4⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                PID:2580
              • C:\Program Files (x86)\MarCom\Driver\VSP Eltima 9.0.exe
                "C:\Program Files (x86)\MarCom\Driver\VSP Eltima 9.0.exe" /VERYSILENT
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4696
                • C:\Users\Admin\AppData\Local\Temp\is-K82RA.tmp\VSP Eltima 9.0.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-K82RA.tmp\VSP Eltima 9.0.tmp" /SL5="$90206,1330796,121344,C:\Program Files (x86)\MarCom\Driver\VSP Eltima 9.0.exe" /VERYSILENT
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  PID:1420
                  • C:\Users\Public\Documents\MarCom\vspdxp_install.exe
                    "C:\Users\Public\Documents\MarCom\vspdxp_install.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2856
                    • C:\Users\Public\Documents\MarCom\NT6X64\vsbsetup.exe
                      C:\Users\Public\Documents\MarCom\NT6X64\vsbsetup.exe
                      7⤵
                      • Drops file in Drivers directory
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Checks SCSI registry key(s)
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4548
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "C:\Windows\system32\regsvr32.exe" VSPort.dll /s /i:"Mahr Esslingen#000GUZ-XT2M4J-BV6PTU-Q8DH20-R6YRZ4-3NTWXA-622F31-3C6EDA-5D8EB0-9BB5CB-62A2E8-756793"
                    6⤵
                    • Checks BIOS information in registry
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3344
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "C:\Windows\system32\regsvr32" VSPort.dll /s
                    6⤵
                    • Checks BIOS information in registry
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • NTFS ADS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1320
              • C:\Windows\SysWOW64\NOTEPAD.EXE
                "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files (x86)\MarCom\Readme.TXT
                4⤵
                • System Location Discovery: System Language Discovery
                PID:3240
              • C:\Program Files (x86)\MarCom\MarComProf.exe
                "C:\Program Files (x86)\MarCom\MarComProf.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:680
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
          1⤵
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4712
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "4" "28" "C:\Users\Admin\AppData\Local\Temp\{a9fb6faf-e23d-5d43-b90c-5063be761615}\ftdibus.inf" "9" "44522b27f" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall"
            2⤵
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            PID:2028
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "4" "8" "C:\Users\Admin\AppData\Local\Temp\{2f8f603a-77e5-984b-8671-653cf9616edf}\ANT_LibUsb.inf" "9" "48f6e236f" "000000000000017C" "WinSta0\Default" "0000000000000170" "208" "C:\Program Files (x86)\MarCom\Driver\AntUSB2"
            2⤵
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Modifies data under HKEY_USERS
            PID:3592
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2e516f62-e3de-9b44-a972-b474134cd0a0}\dfu.inf" "9" "448afa067" "00000000000001A0" "WinSta0\Default" "0000000000000174" "208" "c:\program files (x86)\marcom\driver\bluedat\bluedat_dongle_driver\windrv"
            2⤵
            • Manipulates Digital Signatures
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Modifies data under HKEY_USERS
            PID:680
            • C:\Windows\system32\rundll32.exe
              rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{9b923b87-3dba-9144-b977-7435c855c481} Global\{3405fb71-1ee7-e045-bbb7-ccb28419093c} C:\Windows\System32\DriverStore\Temp\{9e8d20fe-3f9a-d541-b040-6ad66c52cf21}\dfu.inf C:\Windows\System32\DriverStore\Temp\{9e8d20fe-3f9a-d541-b040-6ad66c52cf21}\dfu.cat
              3⤵
                PID:4388
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{4348ba8f-f3e0-2a48-ac48-0748b765a102}\usbserial.inf" "9" "4241759f3" "0000000000000174" "WinSta0\Default" "0000000000000164" "208" "c:\program files (x86)\marcom\driver\bluedat\bluedat_dongle_driver\windrv"
              2⤵
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Modifies data under HKEY_USERS
              PID:4544
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "4" "8" "C:\Users\Admin\AppData\Local\Temp\{6a45ac40-6618-eb48-9e19-04d8e84ed19c}\slabvcp.inf" "9" "49fe42bcf" "0000000000000164" "WinSta0\Default" "000000000000019C" "208" "c:\program files (x86)\marcom\driver\steute"
              2⤵
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Modifies data under HKEY_USERS
              PID:4720
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0968d407-2bc8-6046-a0ac-d51ebccf1c6a}\evserial9.inf" "9" "4ccdef8eb" "000000000000019C" "WinSta0\Default" "00000000000001A0" "208" "C:\Users\Public\Documents\MarCom\NT6X64"
              2⤵
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              PID:4544
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{94411ded-e035-9747-a979-a3e5a4627a16}\evsbc9.inf" "9" "44fb335b7" "00000000000001A0" "WinSta0\Default" "0000000000000174" "208" "c:\users\public\documents\marcom\nt6x64"
              2⤵
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Modifies data under HKEY_USERS
              PID:676
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem9.inf" "evsbc9.inf:947a44d0838aed2e:VSBus_Device:9.0.369.0:vsbc9," "44fb335b7" "00000000000001A0"
              2⤵
              • Drops file in Drivers directory
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Suspicious use of AdjustPrivilegeToken
              PID:2228
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
            1⤵
            • Checks SCSI registry key(s)
            PID:4856

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-1AJHJ.tmp

            Filesize

            14KB

            MD5

            12e29096bd05a79c9f13e21ae1627b8a

            SHA1

            b3b2a31206503c11cbeac587ad77dfbe7fe501aa

            SHA256

            8d0d3c0420c2f970ab7ba96d7223b63ad71205c97cc87a53ac247a0e829756d4

            SHA512

            c72a4b8ce79689249319c21a98cd71d183a719f7f93acd3b2510579acb9add101f47c63252cf7ad26d7e32ab4f53cbfbfed70d21bc0fe15570b388b5407210fb

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-1NJLP.tmp

            Filesize

            56KB

            MD5

            fd8621730814ba0c8552a057dbabc2e6

            SHA1

            90057ffab3c8367988ffcafc051ecfac13816aa4

            SHA256

            4d50cd88c5f26ab1d71c419a30d07667a8abc28b8bbe0f8bdc43e4f2aab9a929

            SHA512

            4143f26716f527c2395909c7c30c9813f561b2a7f27fcf2823b4ff1de7c9aca52eef7bd26b84d5c100ee248441ae031c901c283682986235115656de50a91ed8

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-2B8E3.tmp

            Filesize

            56KB

            MD5

            a0d8116feba7f633a88c9ed53c0dccb5

            SHA1

            fa9e67dbf039e449c31d5ce9c528e2846e4bf808

            SHA256

            ee4781de467fe8769517fdf548bc6199068d29a7b84b59d465cb75bc134f1f7d

            SHA512

            734c84b30bd7341f4d54d6f26d7baef2daf02b138a8145cea2c5bff1a31df1733c78b9d96f9a0b3d34cc6a23af062ef26639cfd9f3cdb208f4361e66a0e656b7

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-2CG64.tmp

            Filesize

            14KB

            MD5

            ae7057a92a800337762709de388eb9a6

            SHA1

            f53a2d52366a4274eb485f7fa799e8b263d786cc

            SHA256

            83e1a47d2b893f26674a57c157e47da5eca6b41781c32b9947d8c713e2b4745e

            SHA512

            03e28cfa0a72a9ff4278fc14ec95187f1af524d93b33a95eb9833ba021c9008a0f01634dccea07cc0d60261dd17ebbd6ba2ff2146e3684e7d5e92706fbf22d32

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-2E3BG.tmp

            Filesize

            56KB

            MD5

            e5328e3beda06d130da52aa8ff34ec6d

            SHA1

            f7e843e47d7209e978c3f33db66e7281fce309cf

            SHA256

            9090c81de6b5336153381a140bf6f815f8171bdbe7258e395a3d7db80f9eccc7

            SHA512

            2e6e5b266baf136c7bc32b45bee0b3b28dc6831f16fb8b34675290c7e1c8a7594f520e895e76482bd7a882faebef3727accac4cde9211baabe0dda8c641acf62

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-4LTH0.tmp

            Filesize

            56KB

            MD5

            d30a13815fe39704fdf07bcb470f20e0

            SHA1

            871db068af3ca581ca9fc51475b6cce09c9e33ca

            SHA256

            444ddc305821e9ead066c3c35b9c2fa4884a0a3cbc075ebb2c6f7440f68fb269

            SHA512

            44aea28ee874644465610b5002d2cd9d758fda281c540a82ab72eb12597f40502d5555b1d2575d70bfbbb5f97e311fc3d46ab35fa83a10eb3222fac3cb0d2758

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-6FF6V.tmp

            Filesize

            56KB

            MD5

            25a962cac4b3ed393f261469d393c33a

            SHA1

            448f6fa6cfc1fccdccea5441983b9e2f684f003b

            SHA256

            ed1162497290dea52b4998edd05b94a62744c4d0be7ed2d777bee913c6041f82

            SHA512

            8fee5cccbcf2ce7e1ca08664b91e8e3c9b23ec915092e7454fdf46a4f946e829b0db8fa68b45d0358a696507f9e6d581ad5e6924f3346df07570230597c7d481

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-79OI8.tmp

            Filesize

            56KB

            MD5

            0b81696970b891b6cd0e511aaa6ee653

            SHA1

            b146350db889f363f1311f022e51350178b3ef35

            SHA256

            46532b337a8872a3a960f60329199f5aeb7705a77d3e25f0b6d244f547ac80b7

            SHA512

            ee9035c1efa73015afe34a84c6eaae6d96a537fc143e0ed3792ef9d4e141897e43bcbc5696bfefe8fd62f4b5820b89bc592346f9dac5ec1ae2a9382e01b0edc8

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-7ORCO.tmp

            Filesize

            56KB

            MD5

            f3eb3154881d718e773288c91f809b22

            SHA1

            b44164f31f511fb11fe8213180540e2e37f5f140

            SHA256

            458ec643d73c25188d73db3bf6767f9453908c92ad336ac6083d6a51c9c636c7

            SHA512

            e1348bd6f577a68c78b047e2564cc3a2007d38bd8e63037ac7a836a07e43704f3e3341a4681b402daa83eb2ef247629920650cf56748febb31a41b20383a2196

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-936D2.tmp

            Filesize

            14KB

            MD5

            8ab0a4c79560158629f2adf2919c1e05

            SHA1

            3a92654be8b9f5a8b35c5b145d026ff15b58c926

            SHA256

            ceacf74a3cc14207f8b26d5055c22dad519a23715221b5ebd4c7aa10786dd0a1

            SHA512

            045adee476690a8012423868dafa61c287ed78d0b6e601f5e357c5663c7018f1b9398316424eb5d00bf9d3e5a5c9973ec658b33ee9b4afedb55bd9ae33d98531

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-I2AUP.tmp

            Filesize

            56KB

            MD5

            fdba803c0e7750334e3548639b3c7bd6

            SHA1

            7089c4bd225fabdd71ba25d43b0933ef5fe15935

            SHA256

            7fcc84ddf61b8dc629c97e187e8543e26bf21b5ee164a3f65bf71bc215f7750e

            SHA512

            da85a25f03ec41485d13bab8c09789f07f4def8fa7fae6bfe2af4dae1dded56dc4a99d5a8e42600a5e7afd8ce1e7dee9326f866eb23aa2c0caf4eee480ba2115

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-JBC2J.tmp

            Filesize

            14KB

            MD5

            529ba830b89231afc431210db67274e3

            SHA1

            1332b2d0c68a36dfc852b35433afe5a9ac805ad4

            SHA256

            a164472ebd3b181619064584f58e9277d53ae88afe15ae237c8a77f9176991ad

            SHA512

            d56a6f447a5a7fecb1976b849162a16a04a3b2f020b5cf07bd85abb36a46a6c57a1ac096da8577b47bc6b6818b8e1f994696b8884248821cf26f04cd15529de9

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-Q0SNG.tmp

            Filesize

            14KB

            MD5

            09877e74bf4061ed0224b64537471bbc

            SHA1

            73624b6b47e5ec93e086b98c4d5427d1e81eb8d2

            SHA256

            a96fbdc0ce64d2cda0c2cbab9d65a031ef9fb4e68220a8492fb5d687574199ea

            SHA512

            bb5cc81713455e20d1cd7a1419e6ee4dcc6f25e3d2363ef952d04daddafa5729fa1de514fccd9d748c8bf1a05bb9aab7e017ae08ca7f53f023f3635fc72c4b56

          • C:\Program Files (x86)\MarCom\Devices\Mem1\is-QL3FV.tmp

            Filesize

            14KB

            MD5

            7da80c35880d9f836870f146fb7d6e4f

            SHA1

            d6a0c3e7ebaae52d8be688973afe67c1da14036d

            SHA256

            14383f9e6f62fc217a0b30bacb0f535541dbe5a6770dd7b84a51006c088a8f54

            SHA512

            144af73dc0646d31e7819647314c7162884453e7879f7ac3140a014e5a578feed65d201d2d195fed686ea4dace1cdd765210ae0b91a265b129e18c6209c50919

          • C:\Program Files (x86)\MarCom\Devices\is-2QEOT.tmp

            Filesize

            14KB

            MD5

            2253f6547340cc53a9c2102cf6aa4de4

            SHA1

            3075909999353c842b15005c7f0e27f3dd3ee780

            SHA256

            6d227b3134453e5e537bfe056ef7035159d736223cf92e0864c17bc876d6de01

            SHA512

            b7bbe9e895b7e42ef58a65d8ec5e272d1923d3ad29e0582c840f78fc50d1ddd2f6d75aed59189a41fd8cf6e99d626363d99413faf70d45a8bb26323246ca0578

          • C:\Program Files (x86)\MarCom\Devices\is-76LKF.tmp

            Filesize

            56KB

            MD5

            10c8be10875b94d86bad7781fb27f492

            SHA1

            21a427a23f8c3203def3eb9e9b8247fd5ae869d7

            SHA256

            f395355f6a98fd99a77750d0226f519a697f5b5b85ba0c2eb825a02f2b02968a

            SHA512

            aeec1efaaf9a136fbafe4f43b26324aabff7ea564eb65060866bfa2f594f1814415c53b2e2236857c8248d96444b429e2de48d73bc313dc5211c553696879dd7

          • C:\Program Files (x86)\MarCom\Devices\is-H3VIV.tmp

            Filesize

            14KB

            MD5

            d6d1916e8583328d3b529f3fd0f9cb94

            SHA1

            49a04fbc52984280514a2bfa7ec6d29ca7637388

            SHA256

            7000223f6e96129f258ffd4c3b5572c7ef9dcf03f4a290daeaa2d7613e62c9ae

            SHA512

            27673e7237a0f129029e00d6b6e9c8c8dc7f1a4df5197e371b9da4e4c059421d9b8ca3a34442a77e59fc3ea7ae682b195d5f2731b7ad713c7330af8863e1cf33

          • C:\Program Files (x86)\MarCom\Devices\is-KG02E.tmp

            Filesize

            56KB

            MD5

            b28369325db1a9a2768e64070b68efd8

            SHA1

            6d2147b9af4ff586a633c27d2c4191b2e70160ad

            SHA256

            8856f0fec8474f86e8a5e7a97aae188e8a268c950295f72fbbad64f3c77f87e1

            SHA512

            162e0a088ed2e6697458e6cf3918f6f2f4ad0e3aa0eeed5a42f0140d5fb569428b8fa6b10e8d38ee697f362d017b19c4d1cdf1bd539c4053f1115c89f19fb79c

          • C:\Program Files (x86)\MarCom\Devices\is-LILU4.tmp

            Filesize

            14KB

            MD5

            dbdd2b0c1429a93fe22e1469417077c3

            SHA1

            5df7ef03baa0a6875ea3779749f43577f5c16d65

            SHA256

            50f7719e43c13c0467cbc09c35858d0b5197dc9c76a7ce5ef6acf4d353f67cad

            SHA512

            2009b78a08d35977d7f82d99c0cad1d762066d0b35e18512dcce574a4d237cd0fa16f6313d7ac8a2e2233c679e3bf94a7941addad5f4e7cfc7503fda241ba103

          • C:\Program Files (x86)\MarCom\Devices\is-U03F0.tmp

            Filesize

            56KB

            MD5

            d10220eea6f1fb1e38e8f91116b4945a

            SHA1

            a75ff42afc657962f3412223d960be41a089bbe1

            SHA256

            a7c0098fe1a621374da6ddbfa2d5d947d5a759abcc3242606c21472dc31b40b9

            SHA512

            3eacb4d82d58ce05aa1383d1bd46c32ee812e07f2b45d474e1af66df659198f9e9b1f8b7b106a645e75a7a868792974c6b452eb3e6c29b176c4bb48d9841d35f

          • C:\Program Files (x86)\MarCom\Driver\ANTUSB2\AntPreinstall32.exe

            Filesize

            1.1MB

            MD5

            1b6473ee30779891aa7c678f3267e239

            SHA1

            b5f3137bb9ece21bc620d9769aba6d35ac93bd9c

            SHA256

            c8b65bfb6ddf43cc11ada2a0d8e2a0fe0efe380a0bdbb18fedebd0d0fda40b6f

            SHA512

            8951b0aa6df03908432bdcf21bd5224cc78580105ae8b1153713d4c0aa5d751695e96b96fa5fe106acb1744e9b408dad9483dc7bf75a2b1cf9f07b4d85588aa4

          • C:\Program Files (x86)\MarCom\Driver\ANTUSB2\AntPreinstall64.exe

            Filesize

            1.3MB

            MD5

            b9635aeb6c67ca61d3f1854f2db2bc30

            SHA1

            558cc639effbc5cee1332b013032224e093ee7f0

            SHA256

            18ef5ce817d5d0e1970af7464a73fdc69306765dbc39d01775aad97453b19f52

            SHA512

            9bdfb553ef24e7ece4eb9f109d1119cd2ea6f976ab80efee0ed210dbc39648ea1fb85dfaaccf5527dccb170d86c1d10a5434a6dc0703fa01afa12f72f174f7bb

          • C:\Program Files (x86)\MarCom\Driver\ANTUSB2\is-597SD.tmp

            Filesize

            1KB

            MD5

            66e200bd27a76764394183c869bd0122

            SHA1

            d38c6687bc5329ca47d2f4c847df2d15b0af468b

            SHA256

            8b45a1870d87afc36fb263ec3304d6f1ded5397e44c7e79a8548f7d964817f5b

            SHA512

            57c36bfba3e24c137df11fc2a40a50727df415b19ae48b3d718e09fb67d8b81867ef12d9848edd6f930a5d4f3ef0f4e03624e848cb3d8695515e6978adab1b05

          • C:\Program Files (x86)\MarCom\Driver\AntUSB2\ANT_LibUsb.inf

            Filesize

            12KB

            MD5

            73ff3e765738fdbd7947d26f63a86440

            SHA1

            f9d2a789f9cff8cec36b544f53877c80f1f73c46

            SHA256

            b37e1136892b1336bec201f6026bbf7336fd9824f172270d8c4606767c822e7a

            SHA512

            7a86044df1d2e81b8d6643a1ea6e3fb27462fdf59ef063aeda6103668747945ef4472127a7e95218c65d70eca73e12a2f8cc53d95b9b794cb3005240dd058cda

          • C:\Program Files (x86)\MarCom\Driver\AntUSB2\AntDriverCtrlFlags_QuietInstall.reg

            Filesize

            462B

            MD5

            0e6da61112d7d146a08daadd919a5a77

            SHA1

            9d907aea20b35c3d67ce7e63d354f1c8d0d1e102

            SHA256

            b020ab6df3cd469ac6988c769d58e22a6a9aa287ac517c99c90e3dc6fe8d290c

            SHA512

            bc87114c379b4a312b6a3421585aeb8efff81a292414752a000faf2ed932552abe98aca029f2813064ec2430bdb9c8a4c366635e5c6fce7b1409126871e4b0e8

          • C:\Program Files (x86)\MarCom\Driver\BlueDat\blueDAT_dongle_driver\is-GRA35.tmp

            Filesize

            12B

            MD5

            673554a0aa7100beda88477b0edd6b40

            SHA1

            44975c34a024a0d54213c2f288fdcfcbaf880138

            SHA256

            099fc1c72b6d3297dd85d684ea6034689230943fd8b9eac70a2f72e0694527f6

            SHA512

            104eb669a3d27a683fe6e06749d7736a8a920d4cb03e921d506ef6093d8a5fb7448fe03df6acbb51bd1f51cfc91281d1fdd5400817135533dbab1d11ce8f8100

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\FtdiPreinstall32.exe

            Filesize

            1.0MB

            MD5

            9943923b51214161cf16643a5b6c0c1e

            SHA1

            fb9f5577b42e4b28381af899bd95282e9054ecef

            SHA256

            54e2c53e5898748d11a1f0cbd9f3c94123af04b000155ce00512d58dece467ed

            SHA512

            3da1ef138f912e1892f01e6d022e089fa68f51c54354cbd99461435b7f1f145344d1d24dbf5ef46c3533052dbe238ab2d4b77d491bb443a4feeeb1f93ea61287

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\FtdiPreinstall64.exe

            Filesize

            1.3MB

            MD5

            e5a0d810d8f2fb6760dd252f15999c47

            SHA1

            0e7eecf2fefb367aa09bc6510291ed9e4b8973c4

            SHA256

            657b271ea1cbd7ccbe33a28afd5f6c850666e80b336a063479901375b47fbcab

            SHA512

            5c2309686af4bee4dd609b5025342c7eee96e0258b4ae7e2498a4e3bb9f54342ab55d7f26aa9288d672b39f10866eb15cba965fb158e317f9938579677698ebe

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\Static\amd64\is-UP571.tmp

            Filesize

            983KB

            MD5

            ad8b4a2a1808c0d366164c4ef69aee3b

            SHA1

            6ccf27160591d0ac0005c36aca31c74c2ffc986a

            SHA256

            2142fe5fe33a1b15c92310aa358d8751ec99c48ccab309af3b37fdead4becc75

            SHA512

            5a05a251e6b2f9deda580f5c29da9b18c9600b04a3a0be5d61b103c13e348aa1a1425d6b265955ccbf2a1f2fabf8c15cf5b0cf8c76e329ecbe109985f5b86136

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\Static\i386\is-DC48R.tmp

            Filesize

            874KB

            MD5

            eb69bd10286a66fe2bd9946967848c03

            SHA1

            03786b15d0d35735b6804b5686d9fb222d3b0380

            SHA256

            7dece164634351a6f47588aa27109ca48454c782254122ecce7360dff559eea7

            SHA512

            06bdf33f82e27f7ce656f5de9549ceeda5d5649e94dfdebfe209e66b17816ab0b915c00da605812651b88521630c119cb74cc5c42f5b798ac8c4568dfb48a297

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-12EDL.tmp

            Filesize

            63KB

            MD5

            c2885ac796b11af0b3eb4f6d305c205e

            SHA1

            74076ea76a2543d523bfc1e97695f7f9f70de1bf

            SHA256

            94c3b96bdc73610cd926353c97b0918ec9515f7da64f57f15240d3966a5c2d38

            SHA512

            11b8438457d3c3cea226a02b1ceb83eefb90459e538921b0f3b855783bbdafbed20efeb1f62164f2b866c181d58825c6cecf71707258e2031c4b7475cff4ae86

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-1ON2M.tmp

            Filesize

            209KB

            MD5

            5085bdd7167c74464f21e463fb0b7c0a

            SHA1

            00f0255300336e8a57d27c0d6260656fd3d57829

            SHA256

            1d0f04c67da0c6e62c236d90123cbb2e89709f1e960f24ed0ba07fa691f47f99

            SHA512

            c6898282371533fdf80cf95b431541169b551715dc2122c5318557efbbe593d21195f6d26c7617a3ee4da8e144fa755d95f128e886285874379eecdff1c0ef08

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-86HN4.tmp

            Filesize

            250KB

            MD5

            bb854269ed4fcdd96ddac2fd7938c5b3

            SHA1

            c9f89e6d15aab0a348611eed941e2a145830eb7d

            SHA256

            0a776a6191c81d3682bb8d6784b45faea858a3dbfbe4e1345386068e02fb7d60

            SHA512

            0cec61b713315977363dffa95a29caa2a96e40892e14f1bce24500a13ae62ec0ad8fcf1ac621ac578ae7cc5db1222bb2a33de5dc464610925a5afc274afb79c8

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-CMNAM.tmp

            Filesize

            53KB

            MD5

            036a6ed7a51e73ae2c0acc6bd814e326

            SHA1

            32ce8f5df256cc01f79fbccf88f43b7c5fe5a058

            SHA256

            278c9a9a7b0167507f750d67d278ac77d98fe06873e250bede9ae4177c69e8b8

            SHA512

            e2be4eaf2ed591d18a938ef37115afd13c430337603cb332d67cf72f81717708372dc53db579f678970172bf95fbe04190b1fbf3a5b833ebfd7e3ea1c1bbedba

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-D38DA.tmp

            Filesize

            83KB

            MD5

            196c9bddbef9b6d0973f398bef5b2eee

            SHA1

            c68ad88223ad70e6a7ee69da6142d9a6aa4eccee

            SHA256

            d4f9c5ced1e33446b45bd2affa6e716b4332af8716477a80437220ac20c6dfe0

            SHA512

            0e7b871a66fa43621e27568188cecc8895bba4a417f624b5a65816b48565f71f3dea6a9c90a393d87a9fc945965b9b92578e01fbc3b8e938159dd1907d78b634

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-DC660.tmp

            Filesize

            73KB

            MD5

            35fd2bb5131714e657b7ab3a78642854

            SHA1

            69b32abcda0973721b6a1ad8d06bcb4bf63f8cc4

            SHA256

            c24ac6d4e0e76b39625fc9051e092439642c3a10122f712c11a562860703f27a

            SHA512

            351c7a6d41573175dccfc4923db7c3dee1d752bf003f454ca3268320903e307664409ea08f72b2d1e8be067ca4b2deca96966a6692eef570e9c17f98166bdbf1

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-Q27AD.tmp

            Filesize

            106KB

            MD5

            f7a0aaed16041897f88e4c438a57e78c

            SHA1

            36cd8e64c9535d743a451d223d3addf638334005

            SHA256

            72777139f330a2e7653c0b5d427b57172275edd4535c5f743bb0ade50037a0f5

            SHA512

            4246cfe369253b99152c4c6c4d9e296119817a30779afd2bbfb35fb677f70cb4c98ce1a4ac65c13ddee713f2f4b841aacad724178c1f02cb9222181f83480f9f

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\amd64\is-VILD6.tmp

            Filesize

            18KB

            MD5

            6dc95e9a3b69764abb0279977987cd94

            SHA1

            ed5dc14b19638d3eb1496fd8316875fcc77c3211

            SHA256

            63a8e3782eba06f4a86691a101b64ed7a8d4e9415ca5eb3c0e669fe3db877928

            SHA512

            b0f9275a8634d0ea248fdbc1e1682642c9ff3b8832c1f63f37f8f59673f43ab604f8bd890477e9e5172380a42a40417b9139c9affdb7ef2bf492337deb46fb06

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-0GTKG.tmp

            Filesize

            196KB

            MD5

            cdeac2611e103a0f935189829cfc99a8

            SHA1

            7c72ec6cd0c724d5b1526fb19bcd6c2020877a35

            SHA256

            c8d561a0f6e11970d1d70c790cfe78fa098788b12e57f54b715b110c615f806b

            SHA512

            c58d3af33f51da982f78358411174e97a2292cbd2f86325a3c82ab65d85ef4fe1dc76e92c2e68f4b988d328c5afb48e332ac57b6aab71ec778b5e812e48bd36a

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-EHEOK.tmp

            Filesize

            19KB

            MD5

            a794957c0b8f0f45bd8354ea2ec24cfc

            SHA1

            a32b31b30dfc9e10f59f5594ff48d20759130169

            SHA256

            61d081d7afc5f699460a4d34b0cd9ee1e81afaa0b03d9d47e0f38737724a29a2

            SHA512

            29f156351ecec2fa04e985fb8976dfd5ad7b926190e7032f6b14b2101d127c5a1de4e3a79d6591576551b045d49b1cadb333e1a6eb282bcbe67b733d63e03e78

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-F7KKN.tmp

            Filesize

            51KB

            MD5

            346e8968e2563f2fc9bb9b0a01e5f9df

            SHA1

            4b86f7b460094c68ce72a57518b4ffc9f33e65e6

            SHA256

            2fa6bab36be094e225d3cf814a84cfb643819f4af82b11a55f65b60abb429bec

            SHA512

            7a66da623fcf8c53b33e18d4010c807481ffa56be0eb18672783ad09fc21c74f098f6127a1fa732bd8dfd0903ea1852e2795d10ea3a4c64d49c46597a50a3c83

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-FUD1N.tmp

            Filesize

            67KB

            MD5

            fef14208203edfac97135a75218d3722

            SHA1

            a4a7c36b25c6ddf58e2b25f21402671371e9b978

            SHA256

            9fabdabc53b8174bf19d53f08cd838db9ab6cb124360ec22c66473d1bb1c4577

            SHA512

            4a4bbcb5ba5b60d3d879b3ae50408c0d7b3fead8e1f84bcd20d2bb8118f16346b3363f1918d92121f16880d264d0dc044e2c70206be3a1d248cf2c402042e251

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-I236Q.tmp

            Filesize

            102KB

            MD5

            b1aec925ccddd3f6825c8b3874fdb896

            SHA1

            38624538523780953193bdf6a507ffdf4e2c3b1a

            SHA256

            61032f868403855527e2fc91d176da07213ed190f93a9f99ee9f0cfb783e59fc

            SHA512

            164e9946c89ff11c2deadd7378a32a34ddc521b0b82304b69a1ef06cba17d5462789b91f60f795a51bfce9c55a4cebbd96675950c519266193a445a5a7c40690

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-KO24G.tmp

            Filesize

            71KB

            MD5

            e4cf4c1f9e3d57a66850f484c08e9ecf

            SHA1

            baba8b919ed196029c4facd4d3b6452a35275e91

            SHA256

            48f1e8d28c060eeb8e8c61d07b15df62d2f172fa34f2bae834c5c76f2a30f1c4

            SHA512

            d863dd046cc5486972b3e355e092ceeaa0362a5e445b8c673255ffab3d989e1d8350e40dce4a77ef2adf3938b70246b76a05837b2ee4bff53bead6273c9f45ba

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-LJEFG.tmp

            Filesize

            213KB

            MD5

            ec44c778a64dcd18bc98a7316e4664f0

            SHA1

            0baf26d07ac076901f474ab50142f4812e986d66

            SHA256

            751258bb040197c7c10683a74b38a1b1aef9c68ca9a58ce2168c8a62cb913371

            SHA512

            0e9fc117d9915d3a213fb06fe901c484849c63c683b29cbf7002b36fbac24ccc6e56ed0f7f7188347146e2f030d24e8a8be20fdd28c3c8bf6c2b0fd0276639ff

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\i386\is-RRLRI.tmp

            Filesize

            60KB

            MD5

            d6e3667f5e2bc6afc50308b480de2999

            SHA1

            c66fd9da6755def80e1ee421b0ecbb8106723b90

            SHA256

            82eaaa4105fa1df8fe516bec815a7634db6aabcd176726e63761ad315f2c43ef

            SHA512

            e1db819ed14196a48ca22bb879c649d1ff14f06919bdb0c04795355adefe9be295f61e335388e29fb5a8d3f8206b3711651397d08947bc605110912ca18121b9

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\is-5P2EL.tmp

            Filesize

            5KB

            MD5

            c9e7b18f155d639f8ec1dee75b776adf

            SHA1

            6849f67bacd4da5a5b9d46803e6850d0be8b3826

            SHA256

            dd6d037222813e2fc878ce9b3d7197a864201072c01622d9cbf5b8463cd6a05e

            SHA512

            4bd44df659888f4fd96c5a06ef90e2018f60201b7a37eeb2d605872280c1a862a41de7312491740ebdb45fe94885ca5ed4a5eb376e0cef2491f60bd8500aea19

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\is-DID56.tmp

            Filesize

            37KB

            MD5

            ddf5dda0d9c77aa541f9a971d8e2d8bc

            SHA1

            ced8fe607d6f958724acac4f0d6cd1da815c1194

            SHA256

            9176282ce22e20b6d0e384987bc2e060f66a8fb76545de49341026134cce2e7e

            SHA512

            456d464838f66c43e652c5fa630039a7d610fb2fe4073a3fee11e23ad66938af65617aefc5ec5f8783cbd4b53cf9d9ceadbf1cb0b0584a07c5bd2289232726c4

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\is-IB8H9.tmp

            Filesize

            5KB

            MD5

            577772f78ebfd15e2eef029284520725

            SHA1

            4c8545eeb6143b6ad3858b5d1e0aee76040b1435

            SHA256

            fe9a14ca08865506207d1458d9948801d88720dd1a4e8d02e65ec92d12e890fb

            SHA512

            30ba7c15e42abeeaaafe20ec6443c2d07af4f9beda511b0357341918e00939d6d826eab72a48bdd4c4b11bc4f39ccde85936e800acf9205f27d55f0827a19fa2

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\is-OOATQ.tmp

            Filesize

            11KB

            MD5

            5ca8640e6171a81f3203db577c674493

            SHA1

            393d217a384fca9fa355a3389273055b6988059e

            SHA256

            c60f69484dfb97d81b5814f5b25844b892d5f0f20d7fe71c11fb9b3dd6bd8bfb

            SHA512

            496039b9271a29831a56481b8aff1034b217d64af15c7943a2fd6a84252d22188c6823a7aa6ca205582ce0897dfe181d19cd58bb3e372b7152be8845ad31dedc

          • C:\Program Files (x86)\MarCom\Driver\FTDI\FtdiPreinstall\is-VKGBP.tmp

            Filesize

            11KB

            MD5

            29a416e493dd79825c742a3e668b847f

            SHA1

            0efdbcb5e96f0c2519e4bab3acff9710d0110630

            SHA256

            036e53ac494a2d8e6c69b510f96e9446e910c96f64bbbe8eb60b6a226ef03838

            SHA512

            63b033e9c1b28af2f09ed2c2ca4785efa5d8fd3a4ad98bfa18fb765c7ae8bfbfe15fea5ddcd16a85f3266f0092b9cfb229cbd33ba154d12f547305fa2c2027be

          • C:\Program Files (x86)\MarCom\Driver\Steute\is-F51QA.tmp

            Filesize

            8KB

            MD5

            3e6dac7821d07f919a38df90b86e3c78

            SHA1

            b9aa87b6f55f0f27b09d40436a52c4d5b081d2aa

            SHA256

            22fecb982248292fb7d4347252106274f036dc100e388343910bf671e93ac009

            SHA512

            c2bf9b1215e3210295fd8db0e34f5f765e68bc9dcaf4b3b9597fe3433b4c90c507a3ede819c80ea51e6ec54a36efdb9c09fb71b29ac4e4c97ae3069f45e4c870

          • C:\Program Files (x86)\MarCom\Driver\dotNetFx40_Client_x86_x64.exe

            Filesize

            41.0MB

            MD5

            1cf262f35322d6c9c7a27fca513fc269

            SHA1

            4cd67f609f89d617d2b206341b8c211e1b88b287

            SHA256

            ddb54d46135dc4dd36216eed713f3500b72fc89863a745c3382a0ed493e4b5da

            SHA512

            663123cbc508c6bc483b7a2630a055c160c56a1c067f2a417a4e91c1bb55b8be5b041a2a76216b594b1adfa47345c8da6f2c80e4a2b3fe0b32f380cf28ebb093

          • C:\Program Files (x86)\MarCom\MarComProf.exe

            Filesize

            4.5MB

            MD5

            77038ee63b375abf661ca4e897c6f676

            SHA1

            552f8a344b39c56db1b875a3fc2ba236d0165a3a

            SHA256

            5453cb9bad014374650989cae8e55f11bb60eb7db6587d44e50fc93af3244f59

            SHA512

            8575d8aba9cd0a27481eed0f3e49781f98a298ddf74866c987f98f10a69c31daa3e872d29d60093c540f3fb97e8a8fcafc79809a739fc78fd8a90531106f5d2f

          • C:\Program Files (x86)\MarCom\is-828AA.tmp

            Filesize

            39KB

            MD5

            11e32422a438f17911a6909abb348cbe

            SHA1

            af7b75007f9d17641f3f94b15fadd3da54d8df15

            SHA256

            40b241e149832fc4728245f0adbccc65effed34122a63afaa80f7000cb048d98

            SHA512

            ee480f64a7b1a735eb0dd523df233546dc5206cc3aebf0759dfc387a36fc2f0b4ab84b990901dce458489b2c69c78de5b47ef34b01a23a6db1cda90c10274186

          • C:\Program Files (x86)\MarCom\is-E686V.tmp

            Filesize

            69KB

            MD5

            291fe0ed7880c51cf4a8c78d04e8b701

            SHA1

            d5d22e60981c2b10ae37ec562b88f3c7e21ef91b

            SHA256

            324dfb28d4c6bf475ab4c68032dcb111f2c2d356a27504c7cfcb4c3e4833b74c

            SHA512

            48248b5a33e32f8e8dcd6ba73f5bd7738b89bfba0aac34371dbb5efd12d7c238ff6bccbd920bded1447b8210710a0b0d01ba85a47865b5328fa6e362bb6445ce

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

            Filesize

            4KB

            MD5

            1bfe591a4fe3d91b03cdf26eaacd8f89

            SHA1

            719c37c320f518ac168c86723724891950911cea

            SHA256

            9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

            SHA512

            02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

            Filesize

            74KB

            MD5

            d4fc49dc14f63895d997fa4940f24378

            SHA1

            3efb1437a7c5e46034147cbbc8db017c69d02c31

            SHA256

            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

            SHA512

            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\0H4D9VJ9\index[1].htm

            Filesize

            33KB

            MD5

            41c54562d56abb4f15c321b7933c167b

            SHA1

            9fe247b42ceb439f085d2318fb6f06b89fb64e62

            SHA256

            f4bf850b389f83419228b3c13e31201d2b672c54bc52bddc44664e813bd5e5f4

            SHA512

            606bba92e60583161ecf9ea905bf9ea2d561a6db307b2f23c5c6bed67e67a2cb1052095bd81df659d75e8a40046a418e47bf8ff6febee4b54ef578dd1fe51178

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\BLZJPBB5\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\UHOV4U59\favicon[1].ico

            Filesize

            14KB

            MD5

            2375529df3c45bd592aa441a11d9e50b

            SHA1

            5e79a035cd1d5a1d16fb18e98d3e9b50de5788f0

            SHA256

            8a7c32b16155df24c05eb2c529a33f39cbb3954e062ddf0f872c43c55dc6b367

            SHA512

            33d5391a5a9f0185222dfb7c829175ba4156dc6a7ef0a7ebbe5ac14365dcdf47aeed4f7309e588d86a6e011779b385a34cc944106a78c7aa318052e5caa5fad2

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6G6HBQJ3\MarConnect--MarCom%20Professional--4103401--SW--DE-EN--v5.4-01.20241009180714518.20241009180714518[1].zip

            Filesize

            24KB

            MD5

            8630d79df4793e97b1fc71ac6d5a2568

            SHA1

            629469bd37f42acb56f5d5e409f26081520410f3

            SHA256

            3b1600d4e96af6076c8e2b40c02bfb96ea9fbab9223bf99fd4475b9bef267bc5

            SHA512

            f8d48a5e46c78a562cc565e8a3bed704a6a3bc2ec4de1310a06b0acb536f4de8742bc9032a834b2cc8199ffb89ed2d345c417d4c1490b80a89abde10be725bc7

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

            Filesize

            1KB

            MD5

            098a97d053d5b918947bbd6b101b02f5

            SHA1

            6a98be83781a440b6b4535b124331c7b3e7f2cd2

            SHA256

            61d2732bb99ca0e729a02607ceac09fe8a938ea120992ae9e9e5f28231bd2cd2

            SHA512

            9bd1283f18856549d533cdd08bf1231f89b9be8d01c88a8f9f12a6b65c3545ef76ae0e69c5db4d3c0d0db649408ee44818549f9ea01b60f809c345efea8212bc

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8

            Filesize

            1KB

            MD5

            df87d75b8bb6a5634fef4940de77f651

            SHA1

            bc16e290f6a736151388623c8ca039d280eda6c6

            SHA256

            65fc498b1f38aa7114c7039764f1278771af14b99e0f4cd60d552b4a533d0604

            SHA512

            2ebd03044bce2c8b7abdba7bb49a5fd1abd775c9074dbbf344b04de95b9135652dbe05c219709cbc468ceea636b46f2540ff44882511d7dcba0214103bed94de

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\83D863F495E7D991917B3ABB3E1EB382_E4A494FD0A91CD3C725529A7EA89E098

            Filesize

            471B

            MD5

            0e904e71f07ec4c44a1f70384bc4192e

            SHA1

            1912f673f1721d4e2bf538254848d9bce7175160

            SHA256

            43b0442c1918cd11268b77a026f9ae453af69d10ef09a3013bb6685f408cf3b1

            SHA512

            444846c5b5d729e5050b9015d71489993d741842d00ae7f758b201f8f6e9cf0e0c75c136fffc7a2f2df99d81cf95955dbaa5ec70ce827a2e3cda904e38487939

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

            Filesize

            2KB

            MD5

            8e9c4e490f52f2fd25de45a1ff45840a

            SHA1

            f8cb045ed958b33af2edd5ac6b794faaf1400c7a

            SHA256

            aac14d84a71d7e40ce8030c3317051209677ff604c86e95e61f52d75acef5fc6

            SHA512

            0b4851a017b8785cac68665a804b93c4359b27c922cf470512325063103c8d1345e959e5f08ba7a73aaa3874960dbd55debcaaa68ea2306e68770e32d9cda143

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

            Filesize

            1KB

            MD5

            101472ac7c019268b3dd5b74030d502d

            SHA1

            03dc622f378f5d6c53f8f343ac24554b0be5581d

            SHA256

            cbeac064bb2f61fd246f9a2740d7cc3003686cd8d16603061397b7e35b842e26

            SHA512

            f672cefb27abc5de6e18b839930109dcd0ee9a89a829fdd1ec62abd104883f08bda46be8e41b05126d2682df93ce10b2fa59cafa0ed0b0a39e3a9ae2f3b0192d

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

            Filesize

            434B

            MD5

            599067ac76c655601bff30cd2947dc02

            SHA1

            ca80e44301be5b8b3c4e3cd957cee5a772d7278c

            SHA256

            4591adca792db78e065a55a7f0e069428b213b66f449cad3069e93bf13fcc2ba

            SHA512

            dae8fcd66c7a97b6a58970d32e62a3491bae0f382544bfce04cd3fe8d0661683b8155ef1165815489244ba894c105c4e67b1439dd24994c4d5218637c18e7776

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8

            Filesize

            438B

            MD5

            54202d4ee7b8023854bfc7fe75944cc3

            SHA1

            eca4b2669099b196f5d5d04118a6ad52855aefea

            SHA256

            a85e98d39ec8f5b0d11eb6077a6e3080fa54b047dd8e9ff3659f891b3208e109

            SHA512

            80a1a815d8d7e3dc650608c62359fa1dc2efc215bd807b0a1a0fb7598bf1168713f232cb8f1916a553652a811b3ce991d448b6e77fb050bade6418e456e9bb8e

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\83D863F495E7D991917B3ABB3E1EB382_E4A494FD0A91CD3C725529A7EA89E098

            Filesize

            422B

            MD5

            04e3b704a31e9b539c7b58d8399e8742

            SHA1

            17498828709b41ea8ddacb5682483823a1c2ba4a

            SHA256

            f6bcf62387f148e9c5c78211805c5440f520e2849dd456039552143657f8e34b

            SHA512

            09ef78e6373229cbc46c518d667845b4f81438003a103a588dc246372ac7cce110cafe88942df9e49c6b4720bb4c50e7d95802a727c7ff7c5e265b943a1febfb

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

            Filesize

            458B

            MD5

            e6901d81a566d296b0743920c92984e0

            SHA1

            b4496412321b4a5ddc0104ea11a4a9f4a5c56f65

            SHA256

            76a00e740a12e50969011ef434409e7c67fa716900cdb9e2bd5452b2744c4d34

            SHA512

            c3575dfebea299beba9baf7d0a4653d3c24d5a4f1197c3db6a83ed4330c2c1757663bd01cdb475584c40370dae9e3d0a558fee158b7ec692e121aa04ea066ed1

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

            Filesize

            432B

            MD5

            0789df790d8ecdfce18e716720ee57a6

            SHA1

            b40a27a058954d77783a936f8a42e87cf59278a6

            SHA256

            f3a05519ee317a5abb5627f2b3d137803457d8a0a4fe515380ec0fb78a2536f5

            SHA512

            d1830d4db2ce9cd04fb5a0484bc402bfacd24d26a05c7858776f949ee2da9d2ea7c1fdc61ef69b57caeb73e1317a9f4147b668f5847cd0816edc3d0b12cf769d

          • C:\Users\Admin\AppData\Local\Temp\HFID161.tmp.html

            Filesize

            17KB

            MD5

            65cdd87c427ad4b2ffc37eed6b1aede0

            SHA1

            e6b21d581ac8e8bfff2d59411e6d8e1541614be9

            SHA256

            d6dac8085f06f7cac203a3d873269ed83d6d01039d0fe87d19f7bc99c76908ca

            SHA512

            7f14807e8aced1ad5a8bb2b9d2a5b87e51be3f3b3f0f27373c5ceb7d6c24f19dbc0363e1708695bf56d6b6a44eab3a883a3df8d13188abbd9e1b4fee323a55fe

          • C:\Users\Admin\AppData\Local\Temp\is-NP6HK.tmp\SetUp-MarCom.tmp

            Filesize

            1.1MB

            MD5

            302e11ab876edb6c8ab42ad4e9310732

            SHA1

            17b395ee4346ab45368ea61dc0d61cededbdb60d

            SHA256

            59d945d06976e149dcf12101110d263c6707b2a9528c0ba4966d4a722103f872

            SHA512

            8dd4695cdcc9de105c54884f3599384a45ac78e6d168ef737851176cdbfb1790e69932a1102d13a331529914b5a79606def4eeb2cb89dc8557bcde8ef571faa7

          • C:\Users\Admin\AppData\Local\Temp\{0968d407-2bc8-6046-a0ac-d51ebccf1c6a}\SET59A7.tmp

            Filesize

            2KB

            MD5

            6dcecef04672e7658f9447f428c85a27

            SHA1

            e7f00c36d33e28506a21eb048097426b245fe16f

            SHA256

            caf802d5bb6274fe9aeba3479b30eaa7150d73a6109d2d5f3262fff18567aca2

            SHA512

            1445be7eb22d8c75f147539273b172c189a8af86d75a93870669bf46d47393f88149d45198b656c524ea50e9e66a5eacace786e07cfe9afa45cad87a03a92b14

          • C:\Users\Admin\AppData\Local\Temp\{0968d407-2bc8-6046-a0ac-d51ebccf1c6a}\evserial9.cat

            Filesize

            8KB

            MD5

            84a9a6df2f3347c1bbec1f447546f340

            SHA1

            d22ace0c21b1d7aab1c38b6e44162b5d8fa57814

            SHA256

            9f2a4b403ffe038e29ea40dff16a326351e92a0f5650ffd079f3c61b1cf129cf

            SHA512

            12d4e4d50283719e616df1b6ddf96d7396a821e93bd6979b95c38a8e8bad9850d308792bfa1248033318a0ec6f8cf170452797a873c65fa3fd52477b0fb9c377

          • C:\Users\Admin\AppData\Local\Temp\{0968d407-2bc8-6046-a0ac-d51ebccf1c6a}\evserial9.sys

            Filesize

            39KB

            MD5

            5e711396e34c2fc752d3082c0220f5e1

            SHA1

            588b14ef04a78057c78e5631f712ca3a9d010dda

            SHA256

            7a2c1b360e6f7234919ce1ff6c9d908fdc0ad2c558899d8658ea9cd7776573c2

            SHA512

            aa396a00dbc83840f5244f6359d292bffdcffb3743a6356931304014e8872b565a7ff73372fdec949d4c2101293727a00f9b9e9a7ac690789fa7e1b53d1240f5

          • C:\Users\Admin\AppData\Local\Temp\{0968d407-2bc8-6046-a0ac-d51ebccf1c6a}\evspd9.dll

            Filesize

            128KB

            MD5

            3894034121e9b1653722d73927e41c0c

            SHA1

            1e289beef33d2ef8d7671abe7fba3ae938e16904

            SHA256

            3ef2e811df0521171b9cacd2c9f900358d64423f035293b912cd71cec4e72e24

            SHA512

            b8b6545b4e690ec191a93994b50563ac699e12531440420625f00c587ee8dc1bbfe99c3b7d4dd9054a49517eedd8968a6215ef1843de2a9ae7f9ec757f4f204a

          • C:\Users\Admin\AppData\Local\Temp\{2e516f62-e3de-9b44-a972-b474134cd0a0}\amd64\WdfCoInstaller01009.dll

            Filesize

            1.6MB

            MD5

            4da5da193e0e4f86f6f8fd43ef25329a

            SHA1

            68a44d37ff535a2c454f2440e1429833a1c6d810

            SHA256

            18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

            SHA512

            b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

          • C:\Users\Admin\AppData\Local\Temp\{2e516f62-e3de-9b44-a972-b474134cd0a0}\amd64\WinUSBCoInstaller2.dll

            Filesize

            979KB

            MD5

            246900ce6474718730ecd4f873234cf5

            SHA1

            0c84b56c82e4624824154d27926ded1c45f4b331

            SHA256

            981a17effddbc20377512ddaec9f22c2b7067e17a3e2a8ccf82bb7bb7b2420b6

            SHA512

            6a9e305bfbfb57d8f8fd16edabef9291a8a97e4b9c2ae90622f6c056e518a0a731fbb3e33a2591d87c8e4293d0f983ec515e6a241792962257b82401a8811d5c

          • C:\Users\Admin\AppData\Local\Temp\{2e516f62-e3de-9b44-a972-b474134cd0a0}\dfu.cat

            Filesize

            7KB

            MD5

            ef5966172939de9ddabdbc1a81fe0958

            SHA1

            372b764fa423397eddae25984a0664e60ed78f55

            SHA256

            2e57f1f85366fc5c48f60f4f388ac76fd7b291f679613414f3c791de2d625764

            SHA512

            8fe578ebe8dec68f80182db44850457aa8949f84b7cea372bbb9209375425fb88d565edab7400734bde204fe76766302e9d4431c9c816f17ea628a013644fc69

          • C:\Users\Admin\AppData\Local\Temp\{2e516f62-e3de-9b44-a972-b474134cd0a0}\dfu.inf

            Filesize

            6KB

            MD5

            a4e5771776c01456b52c9c7dd9e7c9b0

            SHA1

            f84194c1262177d1dcd692f453b7181fab9a1edd

            SHA256

            6d8504de691d3be4d41cad4f7c76092e0c964fe6aa28b1b76814390fa29a6aab

            SHA512

            b6ab181e064131998a74da9963290679a909aa8327b6bc87e131f66ff0b08a198f6e27e64265e0e39f50e34a539a51bd251fe781d7c251e3253aa3a4628deb36

          • C:\Users\Admin\AppData\Local\Temp\{2f8f603a-77e5-984b-8671-653cf9616edf}\ANT_LibUsb.cat

            Filesize

            10KB

            MD5

            2d359581c77a5d9cc21f2e696fccf76b

            SHA1

            d5ac2645cb1432d3c447dc07c8cc56d9691ef2fb

            SHA256

            0ee4ca9ca94127f953e569fa6be9596d12b123c0cefa0927e68ad8f8287dae74

            SHA512

            3278d5b5ec9d5a29a3dd8f0a18ff39d9a2a23e15037192a737e25b8bda184c245b24636baadb83e642b79de4fcfb6b82b0f31cc2b4da0620c2d3652377cf8025

          • C:\Users\Admin\AppData\Local\Temp\{2f8f603a-77e5-984b-8671-653cf9616edf}\amd64\AntUsbCoInstall_x64.dll

            Filesize

            48KB

            MD5

            ba029f618770b6ddbb5eceb161df78a8

            SHA1

            48913d7e093b3f3c40579e11bba5375669ebe384

            SHA256

            55880aba57e6f35960b7e810dcd6fd4f65ff4c1e49d96ec2172bfb1800f7197f

            SHA512

            9e1b89714986fe56b619adcc4d7a9c78fed3bb044067e7bf24c82bb2da6266b40cf6f60e7a6bf19a9830879e48748d2d045a6df0384113d3c8483e66aecc0eb3

          • C:\Users\Admin\AppData\Local\Temp\{2f8f603a-77e5-984b-8671-653cf9616edf}\amd64\libusb0.dll

            Filesize

            73KB

            MD5

            9cdc3af86784c278e613584ef8b4d572

            SHA1

            5bb79d1d2b82ab9d9d6dd66f7e9ed28b76c26aa1

            SHA256

            6b34b5fc18d2985c4e0909dd4a07b1058d351cd53f2a82565128c41d25c2685e

            SHA512

            d635ccb47687da5865cd2d252b7809bb1a4022f3eca649b7825e0240791945fa2199d42ed1673c199766aad44902117d1c288f09e8216f847776fd35edfb4c68

          • C:\Users\Admin\AppData\Local\Temp\{2f8f603a-77e5-984b-8671-653cf9616edf}\amd64\libusb0.sys

            Filesize

            43KB

            MD5

            02538e602280c07438c94489dcbe77d5

            SHA1

            e1c9295a8980486fec38b4af2186a577a591ce46

            SHA256

            2e2b60e5fb7a274f4945444d5edb058e62cac268c5336ff8f4b9e82245095211

            SHA512

            c3d824051fe3d0609a9b7915885e699f9571245c824b938464b4e2ff6138ec299245a45a1189dbcb68218a2ef198e6ed6fd7ff48227f82ae1f5fd59d40077f67

          • C:\Users\Admin\AppData\Local\Temp\{2f8f603a-77e5-984b-8671-653cf9616edf}\x86\libusb0_x86.dll

            Filesize

            65KB

            MD5

            32dbf187ba54c67b889f45202cca8111

            SHA1

            1d748e0329cd455e902d25c1d58bd2b724bca569

            SHA256

            5d675c21d0eb0a4bb98f21c13e369ec72163ae3ab1aed7bfe92caeef38eca5d6

            SHA512

            514e90b37ddde1116291f3e684103592edd4495395d05b290fac7cbd0803d1e64a59ed2ca0f52f386cdd0556f7cdbd6c301b24d2e9a29c668da94b844b022a48

          • C:\Users\Admin\AppData\Local\Temp\{4348ba8f-f3e0-2a48-ac48-0748b765a102}\usbserial.cat

            Filesize

            5KB

            MD5

            01b29a0a4b8046e41c1072fc2d9ce74e

            SHA1

            09eb956ca1d483157321725653063c7e4f7aceab

            SHA256

            e5ecdceb203a4bd669610157ca723768c11dd97930d60bd4a7ffbc14cf5ac224

            SHA512

            afccc9fd31810da5da788aef9cd1c147b5eb7d67eeb64d2108854077015da0dd16c9bef68721050a0f4ce8574a3da9c78ece212aaaa9208da41aa6f46f0e3302

          • C:\Users\Admin\AppData\Local\Temp\{4348ba8f-f3e0-2a48-ac48-0748b765a102}\usbserial.inf

            Filesize

            3KB

            MD5

            37bab992be62b5b3583cc62c7e8e8362

            SHA1

            878a67092cb9ff045b99d0bd3cfc307141c554a9

            SHA256

            9f995c41c0a69d3a073ff8a11c79d202506b42c71a212ff1b80a33587f9b165a

            SHA512

            cea3d9a8959d425f6ceefc0b99182309d6d47202607a73e4caa797dff52dc495bbc22d61948d97291f6b73e5c85c532fc3284107b5fe6a03aa61711ac9028f18

          • C:\Users\Admin\AppData\Local\Temp\{6a45ac40-6618-eb48-9e19-04d8e84ed19c}\slabvcp.cat

            Filesize

            10KB

            MD5

            77977f089483dad377d88a456195d949

            SHA1

            3f35bc97d43c760d8ead5335d61baf3e490f85ab

            SHA256

            51c7367db0d17235c08bdb87a268b5b7bd72ee5214abde49de1bcb7a9268c04d

            SHA512

            ac16fbd765948db4f24e73ae7dac5b22d614a6b16a1b48029cb7b0a571f904591c99085107d419fa8faffde7035bf52f1ae7470c84fa88fd0ae6b368a40fa499

          • C:\Users\Admin\AppData\Local\Temp\{6a45ac40-6618-eb48-9e19-04d8e84ed19c}\slabvcp.inf

            Filesize

            14KB

            MD5

            c0894c7be655b1fd56abd55b1797670a

            SHA1

            9e2c239d42290b984a9e2b350a67af8bc8bd11b9

            SHA256

            de3a1425168424b610f9ba974a7552dc55cf0bec4d043e0c8f911cc81ec789b1

            SHA512

            2852fa18dbe2dd39e98803ae4fd10a2a04da076b89079a726cbd4af56ed157ce3dd69181427c1422a5ea42b54035ce2d8f08be3bdaa330cdb94dded4ac749803

          • C:\Users\Admin\AppData\Local\Temp\{6a45ac40-6618-eb48-9e19-04d8e84ed19c}\x64\WdfCoinstaller01009.dll

            Filesize

            1.7MB

            MD5

            fc7f3d13a29978107e13dd182448f9df

            SHA1

            96f93240098ae84815ebae8be78d5e31596d4565

            SHA256

            712d16542a881275041dcb788b279a6992caa22b286e0f6a2ce45513ec8241f0

            SHA512

            d374bf1bcf0b568f8c581258b5d3ddaf31b180fa2b231e17bf2f2c3f8cede8de3574e29bddfc0dc1112c3a8338897a586a4bcdba3c5a9686facd91927baff318

          • C:\Users\Admin\AppData\Local\Temp\{6a45ac40-6618-eb48-9e19-04d8e84ed19c}\x64\silabser.sys

            Filesize

            108KB

            MD5

            74343fe7d336d4d82afccd17504e93bc

            SHA1

            603f53b11618692562422838be39d4b505391f7a

            SHA256

            1d48f035f271593792e6bf15ee480fbb9013fb95deb37860f7f933b5c0e08203

            SHA512

            66e751205813581909bc5a31a8abcb9a8fb74c8624b6abab3d515680a2fafe8c11575b6f835e5a8be3fb711ea63ab13318fb47ffbcda93af9a21d2c7a85f30bb

          • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\logo.png

            Filesize

            1KB

            MD5

            d6bd210f227442b3362493d046cea233

            SHA1

            ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

            SHA256

            335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

            SHA512

            464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

          • C:\Users\Admin\AppData\Local\Temp\{94411ded-e035-9747-a979-a3e5a4627a16}\evsbc9.cat

            Filesize

            8KB

            MD5

            eae532655318d50e3135f1e77a312256

            SHA1

            5f96df56a0eeefe8679eeb9e8f3b7b1c7ad80174

            SHA256

            673f8adbf3fd815908ca492e12901779cf4c0513334dca039627717d01422fc5

            SHA512

            1186656ac1c25a5da865f0d32201bc261fac0dd762bb04361a80f4cef55a2da0d1aa96f07cb19783a5bf9904f5223bde280452af5bbcb1c57a74bdbfe330d528

          • C:\Users\Admin\AppData\Local\Temp\{94411ded-e035-9747-a979-a3e5a4627a16}\evsbc9.sys

            Filesize

            124KB

            MD5

            f1831467d68d64adb65cb3e80870c984

            SHA1

            125dbd712356435ecd29896f8bafdb43b8bbc4fd

            SHA256

            10b174cb3c968ab5d9c37e084ea9b31b01cd2d9bfe55da56d4782272e4619eb7

            SHA512

            1c81297c97d36348281e9c033683b051e56fcf0bcc235b558c339faa3a7381667697de19ebe7cf45a719f90072d0212dbb8afa096665e4a5b11c1de99dbaab1b

          • C:\Users\Admin\Documents\MarComProf\DAT\DEFAULT.MCC

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Public\Documents\MarCom\NT6\is-FPK71.tmp

            Filesize

            2KB

            MD5

            5a84982cc1d33bd4788f0963418119f8

            SHA1

            1fc4e704b47a454a667e82aba642166e7b505099

            SHA256

            6868cf0ce9ba8e6467081b30b0124c60d02e0c76c9d7c55ac011925f2454a493

            SHA512

            70d90fb1ee8c3e8a46620af1632beb2c676abc19e1fabf9ee23f92df3afe8ba6af36265cd40d121c8db55e2a7f387743d754b1f534ff852a650fd4296e1fe559

          • C:\Users\Public\Documents\MarCom\NT6\is-ODRAI.tmp

            Filesize

            1KB

            MD5

            30bf3a196f6503c0d4565acb3cae19a1

            SHA1

            063ecd317a58094023815cf4cb6c60690051baa6

            SHA256

            4014cd4e1b4a096a3cfb841ebd5502ad3acf456404fa56fd3e763c479d9f7a99

            SHA512

            f2911b1405dd0bf72505eb956dc88ac8662d14ffdd0e4ea908cfee214608979bb88b2302d7c8b6ec28e7a5dc1f71ef1ce177bdf204d3ea3495b77ba17780c928

          • C:\Users\Public\Documents\MarCom\NT6\is-TNUBT.tmp

            Filesize

            1KB

            MD5

            4efc5d41d325f04b8feeb474870c9ec6

            SHA1

            e2a7faab6dc2a55f1674fa50a558b8aa09b65d07

            SHA256

            1e5424a8211e1431c7c4e91d027c803e808b4bf866271a0aa2af5cbda687fafb

            SHA512

            c8313340e49b4f2387214ae312aaaaa48dcd03a46b6ba54fadcc93f0e7ff51b213b2b76ca4c73d162f427f88e881bc54bbb847eab5671f9ec6ea39bfcf1301b3

          • C:\Windows\System32\CatRoot2\dberr.txt

            Filesize

            93KB

            MD5

            7b8a172a677a27e4ce5fcb23c1dadae0

            SHA1

            715717cc0e5c5c933161a428e8bbb34c8bac3229

            SHA256

            38aaa13298b01a6550a616704c4420bb492b24b3a25427acc55de6a960a3d6ae

            SHA512

            e48bb928a071914760fdf678dee96e98be41cf70a25ae356a4cba693098f2038192d8faa2cf6cfd23ab531941598521670c8a71ce5b1bed141a18b491790f949

          • C:\Windows\System32\CatRoot2\dberr.txt

            Filesize

            93KB

            MD5

            0ad0a5d00d6a7df7e7595d930450bd81

            SHA1

            2bd5bd7e06e477a5f9096927486e0e7528a112b8

            SHA256

            17447b27d883b1eb132818e3bac84172acec7bbedccb58e45d2b1d45953a694d

            SHA512

            4f637a5ef85f09ec401550f85df02eeb0abe37e9703acee4225d9f5295abd797e90aeb47c4640e152c7a630824b476ee30f00373a30dd7b82bf88bfe88d8b4b2

          • C:\Windows\System32\catroot2\dberr.txt

            Filesize

            93KB

            MD5

            39c205a431664be7734fbd40235296bf

            SHA1

            86286781cf9ded8061c40ab3a9fa3d7a08dc02ad

            SHA256

            21eada73e825de572de935211450f5d6e1cecf408f709608d92083dd3739bf04

            SHA512

            8ca0a50f4f6e0b30bf34b4ff7e4011e258c819f647e949da647a780fd37e7fef9a329537aed6343401f7722469ba3e9ff9b05864094dccf4351fabdcf044cc49

          • F:\04759164cb881f02f0fe5b7dca\Setup.exe

            Filesize

            76KB

            MD5

            006f8a615020a4a17f5e63801485df46

            SHA1

            78c82a80ebf9c8bf0c996dd8bc26087679f77fea

            SHA256

            d273460aa4d42f0b5764383e2ab852ab9af6fecb3ed866f1783869f2f155d8be

            SHA512

            c603ed6f3611eb7049a43a190ed223445a9f7bd5651100a825917198b50c70011e950fa968d3019439afa0a416752517b1c181ee9445e02da3904f4e4b73ce76

          • F:\04759164cb881f02f0fe5b7dca\SetupEngine.dll

            Filesize

            788KB

            MD5

            84c1daf5f30ff99895ecab3a55354bcf

            SHA1

            7e25ba36bcc7deed89f3c9568016ddb3156c9c5a

            SHA256

            7a0d281fa802d615ea1207bd2e9ebb98f3b74f9833bba3cb964ba7c7e0fb67fd

            SHA512

            e4fb7e4d39f094463fdcdc4895ab2ea500eb51a32b6909cec80a526bbf34d5c0eb98f47ee256c0f0865bf3169374937f047bf5c4d6762779c8ca3332b4103be3

          • memory/680-3913-0x0000000008D50000-0x0000000008D6C000-memory.dmp

            Filesize

            112KB

          • memory/680-3906-0x0000000007810000-0x0000000007D0E000-memory.dmp

            Filesize

            5.0MB

          • memory/680-3909-0x0000000008130000-0x00000000081C2000-memory.dmp

            Filesize

            584KB

          • memory/680-3908-0x0000000007D90000-0x00000000080E0000-memory.dmp

            Filesize

            3.3MB

          • memory/680-3914-0x0000000008310000-0x000000000831E000-memory.dmp

            Filesize

            56KB

          • memory/680-3915-0x0000000008EC0000-0x0000000008ECC000-memory.dmp

            Filesize

            48KB

          • memory/680-3907-0x0000000008320000-0x0000000008926000-memory.dmp

            Filesize

            6.0MB

          • memory/680-3898-0x00000000076A0000-0x00000000076C1000-memory.dmp

            Filesize

            132KB

          • memory/680-3904-0x00000000077A0000-0x000000000780C000-memory.dmp

            Filesize

            432KB

          • memory/680-3903-0x00000000076D0000-0x00000000076DA000-memory.dmp

            Filesize

            40KB

          • memory/680-3902-0x0000000007710000-0x0000000007726000-memory.dmp

            Filesize

            88KB

          • memory/680-3901-0x00000000076F0000-0x0000000007708000-memory.dmp

            Filesize

            96KB

          • memory/680-3918-0x00000000092E0000-0x00000000092F6000-memory.dmp

            Filesize

            88KB

          • memory/680-3900-0x0000000007690000-0x000000000769A000-memory.dmp

            Filesize

            40KB

          • memory/680-3899-0x0000000073B40000-0x0000000073B61000-memory.dmp

            Filesize

            132KB

          • memory/752-2752-0x0000000000100000-0x0000000000277000-memory.dmp

            Filesize

            1.5MB

          • memory/752-2756-0x0000000000100000-0x0000000000277000-memory.dmp

            Filesize

            1.5MB

          • memory/2664-16-0x0000022337120000-0x0000022337130000-memory.dmp

            Filesize

            64KB

          • memory/2664-0-0x0000022337020000-0x0000022337030000-memory.dmp

            Filesize

            64KB

          • memory/2664-35-0x0000022336120000-0x0000022336122000-memory.dmp

            Filesize

            8KB

          • memory/3876-2794-0x0000000000990000-0x0000000000B0C000-memory.dmp

            Filesize

            1.5MB

          • memory/3876-2760-0x0000000000990000-0x0000000000B0C000-memory.dmp

            Filesize

            1.5MB

          • memory/4600-44-0x000001D4B1400000-0x000001D4B1500000-memory.dmp

            Filesize

            1024KB

          • memory/4868-193-0x000001A567700000-0x000001A567800000-memory.dmp

            Filesize

            1024KB

          • memory/4868-250-0x000001A568960000-0x000001A568A60000-memory.dmp

            Filesize

            1024KB

          • memory/4868-251-0x000001A567800000-0x000001A567900000-memory.dmp

            Filesize

            1024KB

          • memory/4868-290-0x000001A553B40000-0x000001A553B50000-memory.dmp

            Filesize

            64KB

          • memory/4868-299-0x000001A553B40000-0x000001A553B50000-memory.dmp

            Filesize

            64KB

          • memory/4868-200-0x000001A567EA0000-0x000001A567EC0000-memory.dmp

            Filesize

            128KB

          • memory/4868-198-0x000001A567800000-0x000001A567900000-memory.dmp

            Filesize

            1024KB

          • memory/4868-197-0x000001A567800000-0x000001A567900000-memory.dmp

            Filesize

            1024KB

          • memory/4868-191-0x000001A568960000-0x000001A568A60000-memory.dmp

            Filesize

            1024KB

          • memory/4868-89-0x000001A565470000-0x000001A565472000-memory.dmp

            Filesize

            8KB

          • memory/4868-91-0x000001A565790000-0x000001A565792000-memory.dmp

            Filesize

            8KB

          • memory/4868-252-0x000001A567900000-0x000001A567A00000-memory.dmp

            Filesize

            1024KB

          • memory/4868-93-0x000001A5657B0000-0x000001A5657B2000-memory.dmp

            Filesize

            8KB

          • memory/4868-221-0x000001A568B80000-0x000001A568C80000-memory.dmp

            Filesize

            1024KB

          • memory/4868-95-0x000001A5659D0000-0x000001A5659D2000-memory.dmp

            Filesize

            8KB

          • memory/4868-222-0x000001A568B80000-0x000001A568C80000-memory.dmp

            Filesize

            1024KB

          • memory/4868-67-0x000001A554000000-0x000001A554100000-memory.dmp

            Filesize

            1024KB

          • memory/4868-194-0x000001A567700000-0x000001A567800000-memory.dmp

            Filesize

            1024KB

          • memory/4868-195-0x000001A567800000-0x000001A567900000-memory.dmp

            Filesize

            1024KB

          • memory/4868-196-0x000001A567800000-0x000001A567900000-memory.dmp

            Filesize

            1024KB

          • memory/4868-204-0x000001A569C60000-0x000001A569C80000-memory.dmp

            Filesize

            128KB