URL:

http://dynamicdownloads.tweakbit.com/driver/st/def/winA0010C-US.exe

Full analysis: https://app.any.run/tasks/db4ded21-4a8b-4adf-9638-94046f381f80
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 05, 2019, 08:19:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
adware
Indicators:
MD5:

8DA251824D47C9F6C6D18FD40FA931C8

SHA1:

B46AF8264B60E0758EE0DBEF54510A61A8104A6B

SHA256:

2945F6097A09E459019DAD75AC27734DD02D63A2EBDB402AA461EB95A48F2F24

SSDEEP:

3:N1KacLhcjLLFHy5USKkk/wLA:CaLpbDX/IA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • chrome.exe (PID: 328)
    • Application was dropped or rewritten from another process

      • winA0010C-US.exe.exe (PID: 4032)
      • winA0010C-US.exe.exe (PID: 4008)
      • DriverUpdater.exe (PID: 4056)
      • DriverUpdater.exe (PID: 2684)
    • Changes settings of System certificates

      • winA0010C-US.exe.tmp (PID: 3464)
      • DriverUpdater.exe (PID: 4056)
    • Loads dropped or rewritten executable

      • DriverUpdater.exe (PID: 4056)
      • DriverUpdater.exe (PID: 2684)
    • Loads the Task Scheduler COM API

      • DriverUpdater.exe (PID: 4056)
      • DriverUpdater.exe (PID: 2684)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2180)
      • winA0010C-US.exe.exe (PID: 4032)
      • winA0010C-US.exe.exe (PID: 4008)
      • chrome.exe (PID: 328)
      • winA0010C-US.exe.tmp (PID: 3464)
    • Reads Windows owner or organization settings

      • winA0010C-US.exe.tmp (PID: 3464)
    • Reads Windows Product ID

      • winA0010C-US.exe.tmp (PID: 3464)
      • DriverUpdater.exe (PID: 4056)
      • DriverUpdater.exe (PID: 2684)
    • Reads the Windows organization settings

      • winA0010C-US.exe.tmp (PID: 3464)
    • Reads the machine GUID from the registry

      • winA0010C-US.exe.tmp (PID: 3464)
      • DriverUpdater.exe (PID: 4056)
      • DriverUpdater.exe (PID: 2684)
    • Reads the BIOS version

      • winA0010C-US.exe.tmp (PID: 3464)
      • DriverUpdater.exe (PID: 2684)
    • Reads the cookies of Mozilla Firefox

      • winA0010C-US.exe.tmp (PID: 3464)
    • Creates files in the user directory

      • winA0010C-US.exe.tmp (PID: 3464)
    • Reads the cookies of Google Chrome

      • winA0010C-US.exe.tmp (PID: 3464)
    • Creates files in the program directory

      • DriverUpdater.exe (PID: 4056)
      • DriverUpdater.exe (PID: 2684)
    • Adds / modifies Windows certificates

      • DriverUpdater.exe (PID: 4056)
      • winA0010C-US.exe.tmp (PID: 3464)
    • Searches for installed software

      • winA0010C-US.exe.tmp (PID: 3464)
    • Creates files in the Windows directory

      • DriverUpdater.exe (PID: 2684)
  • INFO

    • Reads settings of System Certificates

      • chrome.exe (PID: 328)
    • Application launched itself

      • chrome.exe (PID: 2180)
    • Loads dropped or rewritten executable

      • winA0010C-US.exe.tmp (PID: 3464)
    • Application was dropped or rewritten from another process

      • winA0010C-US.exe.tmp (PID: 3532)
      • winA0010C-US.exe.tmp (PID: 3464)
      • reader.exe (PID: 1324)
    • Creates files in the program directory

      • winA0010C-US.exe.tmp (PID: 3464)
    • Creates a software uninstall entry

      • winA0010C-US.exe.tmp (PID: 3464)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
19
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs wina0010c-us.exe.exe wina0010c-us.exe.tmp no specs chrome.exe no specs wina0010c-us.exe.exe wina0010c-us.exe.tmp reader.exe no specs driverupdater.exe no specs chrome.exe no specs driverupdater.exe SPPSurrogate no specs vssvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
328"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=956,8681400434083708809,201876131481113161,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=12376645379191698359 --mojo-platform-channel-handle=1512 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
772"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=956,8681400434083708809,201876131481113161,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=10998193426639463754 --mojo-platform-channel-handle=3876 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1008"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,8681400434083708809,201876131481113161,131072 --enable-features=PasswordImport --service-pipe-token=1900680959231028357 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=1900680959231028357 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2028 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1324"C:\Users\admin\AppData\Local\Temp\is-U82FR.tmp\reader.exe" "C:\Users\admin\Downloads\winA0010C-US.exe.exe" "(x32)HKEY_LOCAL_MACHINE\Software\\TweakBit\\Driver Updater\\2.x\\Settings"C:\Users\admin\AppData\Local\Temp\is-U82FR.tmp\reader.exewinA0010C-US.exe.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\is-u82fr.tmp\reader.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1388"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=956,8681400434083708809,201876131481113161,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=12444739491791191842 --mojo-platform-channel-handle=1816 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1424C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2156"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2356 --on-initialized-event-handle=308 --parent-handle=312 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2180"C:\Program Files\Google\Chrome\Application\chrome.exe" http://dynamicdownloads.tweakbit.com/driver/st/def/winA0010C-US.exeC:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\gdi32.dll
2292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=956,8681400434083708809,201876131481113161,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=10374290705825791208 --mojo-platform-channel-handle=940 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2316"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,8681400434083708809,201876131481113161,131072 --enable-features=PasswordImport --service-pipe-token=4843485197905039858 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4843485197905039858 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
2 545
Read events
2 331
Write events
205
Delete events
9

Modification events

(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2156) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2180-13198925961194500
Value:
259
(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2180) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3488-13197474229333984
Value:
0
(PID) Process:(2180) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
46
Suspicious files
22
Text files
95
Unknown types
8

Dropped files

PID
Process
Filename
Type
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\59e47d52-661b-419a-b227-6b51b6fd4f1d.tmp
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\index
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000018.dbtmp
MD5:
SHA256:
2180chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
12
DNS requests
9
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
328
chrome.exe
GET
200
149.56.19.59:80
http://dynamicdownloads.tweakbit.com/driver/st/def/winA0010C-US.exe
CA
executable
12.0 Mb
whitelisted
2684
DriverUpdater.exe
POST
172.217.18.174:80
http://www.google-analytics.com/collect
US
whitelisted
3464
winA0010C-US.exe.tmp
POST
200
172.217.18.174:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
2684
DriverUpdater.exe
GET
200
104.237.131.139:80
http://www.tweakbit.com/tools/ipInfo/
US
text
121 b
whitelisted
3464
winA0010C-US.exe.tmp
POST
200
172.217.18.174:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
2684
DriverUpdater.exe
GET
200
52.202.28.89:80
http://ws.driverhive.com/driverservice.asmx
US
html
9.09 Kb
unknown
3464
winA0010C-US.exe.tmp
POST
200
172.217.18.174:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
3464
winA0010C-US.exe.tmp
POST
200
172.217.18.174:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
3464
winA0010C-US.exe.tmp
POST
200
172.217.18.174:80
http://www.google-analytics.com/collect
US
image
35 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
328
chrome.exe
149.56.19.59:80
dynamicdownloads.tweakbit.com
OVH SAS
CA
suspicious
328
chrome.exe
216.58.206.13:443
accounts.google.com
Google Inc.
US
whitelisted
328
chrome.exe
172.217.23.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
328
chrome.exe
172.217.22.14:443
sb-ssl.google.com
Google Inc.
US
whitelisted
3464
winA0010C-US.exe.tmp
104.237.131.139:443
tweakbit.com
Linode, LLC
US
malicious
2684
DriverUpdater.exe
104.237.131.139:80
tweakbit.com
Linode, LLC
US
malicious
3464
winA0010C-US.exe.tmp
172.217.18.174:80
www.google-analytics.com
Google Inc.
US
whitelisted
328
chrome.exe
172.217.18.99:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2684
DriverUpdater.exe
52.202.28.89:80
ws.driverhive.com
Amazon.com, Inc.
US
unknown
2684
DriverUpdater.exe
172.217.18.174:80
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
dynamicdownloads.tweakbit.com
  • 149.56.19.59
whitelisted
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
accounts.google.com
  • 216.58.206.13
shared
sb-ssl.google.com
  • 172.217.22.14
whitelisted
ssl.gstatic.com
  • 172.217.18.99
whitelisted
tweakbit.com
  • 104.237.131.139
whitelisted
www.google-analytics.com
  • 172.217.18.174
whitelisted
www.tweakbit.com
  • 104.237.131.139
whitelisted
ws.driverhive.com
  • 52.202.28.89
  • 52.204.55.108
unknown

Threats

PID
Process
Class
Message
328
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
328
chrome.exe
Misc activity
ET INFO EXE - Served Attached HTTP
2684
DriverUpdater.exe
Misc activity
ADWARE [PTsecurity] PUP.Tweakbit External IP with minimal header
1 ETPRO signatures available at the full report
Process
Message
DriverUpdater.exe
Begin logger initialization...
DriverUpdater.exe
Initializing thread ID = 0xBB4 - Context: DriverHiveEngine - entry point
DriverUpdater.exe
Executable: C:\Program Files\TweakBit\Driver Updater\DriverUpdater.exe
DriverUpdater.exe
Version: 1.0.20.23
DriverUpdater.exe
Maximum filesize set to 4194304 bytes
DriverUpdater.exe
ME not enabled
DriverUpdater.exe
EL not enabled
DriverUpdater.exe
End logger initialization
DriverUpdater.exe
[2019-04-05 08:20:16:156] [dhEngineInit] Windows version: 6.1.7601 Platform: 2
DriverUpdater.exe
[2019-04-05 08:20:16:172] [dhEngineInit] Default Locale ID: 1033