Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 13:29

General

  • Target

    2025-01-23_ef5b79d11d56ac638acea43040ba6e2e_floxif_icedid.exe

  • Size

    22.2MB

  • MD5

    ef5b79d11d56ac638acea43040ba6e2e

  • SHA1

    be50d85741ddf0c0b28b55e340b330824ec341e8

  • SHA256

    a3423bf9cd6d13981e3efb81bd2d4861b2606d1bfcca8472e1ade9a8f87bd905

  • SHA512

    6381b6c4ef8de0fc48c564c9e02f6df1d562434ad3ddf86fa4a456b9ca49847f3b8c3f14caecfc88aa2a340df055e6b7a10ca1f6db22ff2b67764192df283052

  • SSDEEP

    393216:6XePsQXKIQ2A6p/jJicojuCXiv3vMBnz4CFxDqg9u4PS6n4CEJXE0wEKD3/LR:6XePsQXKx6liUCXk3EmCFpq4PznwXDwB

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 15 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 47 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-23_ef5b79d11d56ac638acea43040ba6e2e_floxif_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-23_ef5b79d11d56ac638acea43040ba6e2e_floxif_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /x {D9FB7F91-9687-4B09-894D-072903CADEA4} /passive
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:432
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi"
      2⤵
      • Loads dropped DLL
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3692
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B1D598C7AE332A07C6FAB6B9C250B50D C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8EC99C7C-7EC4-42BD-82E1-FE5321644336}
        3⤵
        • Executes dropped EXE
        PID:3980
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3F5DEB4D-66AE-4EF1-8330-6B30A930451D}
        3⤵
        • Executes dropped EXE
        PID:3188
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FD610B24-581F-435D-81DC-C4401B358B6C}
        3⤵
        • Executes dropped EXE
        PID:3544
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3670F6FE-063A-4A20-8718-B1824632C031}
        3⤵
        • Executes dropped EXE
        PID:4396
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C820336A-18E3-4ED2-B589-F931DEDD4948}
        3⤵
        • Executes dropped EXE
        PID:3492
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DA6378A4-D774-4AD6-A98C-C67E0AA8111D}
        3⤵
        • Executes dropped EXE
        PID:1760
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C61D77CB-E87C-424B-82C0-0AB72F44234D}
        3⤵
        • Executes dropped EXE
        PID:536
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{38DAC98F-DA49-4E50-A00E-0C197C2B2D67}
        3⤵
        • Executes dropped EXE
        PID:1728
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1481E3A2-F845-4E9D-A9C7-42B75BDB0D1B}
        3⤵
        • Executes dropped EXE
        PID:1572
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6C9F076F-3992-410C-8AD9-07431B60B829}
        3⤵
        • Executes dropped EXE
        PID:760
      • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1D14272E-37AC-4DE8-886E-25CF6E60B42A}
        3⤵
        • Executes dropped EXE
        PID:1500
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4716
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 1F5F39817CC5C8FD0C242F1398FBB89F E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • Blocklisted process makes network request
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:4396
        • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\DriverInstaller64.exe
          "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\DriverInstaller64.exe" "/I|0|C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious use of SetWindowsHookEx
          PID:4192
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:864
    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\Tools\qcmtusvc.exe
      "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\Tools\qcmtusvc.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3116
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcfilter.inf" "9" "4f0333d67" "0000000000000148" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Manipulates Digital Signatures
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{b918628d-2103-6d4b-9625-5a2097a0ebbb} Global\{b0f686f0-527a-d042-947c-2fa5e8237f42} C:\Windows\System32\DriverStore\Temp\{6a2a49cf-717e-9345-bf76-b5391c4ab520}\qcfilter.inf C:\Windows\System32\DriverStore\Temp\{6a2a49cf-717e-9345-bf76-b5391c4ab520}\qcfilter.cat
          3⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:908
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcser.inf" "9" "4417f2877" "0000000000000160" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:1824
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcmdm.inf" "9" "4f8e1879b" "0000000000000158" "WinSta0\Default" "000000000000017C" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:632
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcwwan.inf" "9" "47c727a63" "000000000000017C" "WinSta0\Default" "0000000000000148" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4888
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qdbusb.inf" "9" "4d5e0b807" "0000000000000148" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e584775.rbs

      Filesize

      37KB

      MD5

      b2a6b567d6af5588585082612b8ed3d2

      SHA1

      9fd26ab697430117b96dcbe19a974afd1d6600a3

      SHA256

      6bb2fdee22fb3241b5af00505666d5f0f75e014396bb744f17cff51b5dd61cdb

      SHA512

      9baafcc1d0c2078efac59a8aeb7d16b982ce704643a28c8322d44c6f7de7508d1fbaf5132cfe0bb72cd7d078ec07e72dd46cf4d939db1eb62c153cd7b887d7fa

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qcfilter.cat

      Filesize

      94KB

      MD5

      184fb15f93f73790d5dfae0a22557ee4

      SHA1

      f3de31f1db7e76fd26d7ad4953b0a01c070da8ba

      SHA256

      2443015b8822a3793c141571135ef1cb79f324700d33266103e3ba599e1b6c21

      SHA512

      5e6e8a7fc5187f886e33769028f2f4aa5410615c681eb0aa0136ac08c81954c86d7a58b000004294dc60239d8f76c3bda9eafcfd3f1ad7d1c86bd3eb6ad2ea3e

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qcwwan.cat

      Filesize

      94KB

      MD5

      a08b4295c74ebc18d6a5f281ca2c3eea

      SHA1

      9718561dd5f541854bb3dceb0554ee780f4cad43

      SHA256

      be76010e324e2fcd9990a82265ff8757375f45fc692202ebf5d974b85fcbc777

      SHA512

      170b32913c40c94ef7d32d2c2c011b6671feb64a91b1ba9c5f0ba44db79264b577871bedbc58ff308ea98926f767823432a86f0749208c1092460d6adb5c92f9

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qdss\amd64\qdbusb.sys

      Filesize

      44KB

      MD5

      c6ea8d40d2bf25d9011c37e27d65c484

      SHA1

      9d00f36c1ba545c2c140aa12e6ff0b5917b17f8b

      SHA256

      ed89b3315d5ff28ccde22b90680d44c7ad8de630601baa2921c96c25d85aae3f

      SHA512

      b54d2e8dd7692ea4f9308be891330d277ba7b592e2a40b1a330176668d1e3aa7243cd792c70743d1f978bcf992116c4c6f28f2cb02fd4536d53cedc9a13e26ea

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qdss\amd64\wdfcoinstaller01009.dll

      Filesize

      1.6MB

      MD5

      4da5da193e0e4f86f6f8fd43ef25329a

      SHA1

      68a44d37ff535a2c454f2440e1429833a1c6d810

      SHA256

      18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

      SHA512

      b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\serial\amd64\qcusbser.sys

      Filesize

      239KB

      MD5

      358bc4b7bf9bca41abea485058f9b360

      SHA1

      47974d8e6512497c9ad6a79919e1cd58366d5e97

      SHA256

      6fff206a1def97219541568d76d2077ac5db1daef2c6d995f6ac4a83e57ed898

      SHA512

      1d6de7f4db5f2320889f8e23176b8e6ebacd8ed03fb7bbb62841e105c83fcc6eaa571c89e605f3d41258fa629dd72c5e2305ea7c26855735b1baced84046404a

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\Difxapi\amd64\DIFxAPI.dll

      Filesize

      507KB

      MD5

      9495b07f33ded991c65d9b04945d44c5

      SHA1

      db9d5ec47980eb0709faba0cda283ff99d643b7c

      SHA256

      bf0798d3a4540b15f45c5b329798a2ac532ff693764948b9b4757265e145216e

      SHA512

      36ff4bd8b252f78a91a8e205bda17bd7f159a11f1616f5bf90fa08164201c272efa817c3974680603ab19a2086ce4dc3a26a504ee811d5a530ccc9e8af6d4815

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\DriverInstaller64.exe

      Filesize

      2.2MB

      MD5

      6e0321ff9f386106d64e7b863e1866ea

      SHA1

      f9898d7bdd18691518ff1d615a693922bcc3a26c

      SHA256

      f0cbd9fb9abc814e470a4126d3f7b7bf2fc769c20593b402ad2cb979e4817625

      SHA512

      0449c4ee6fb9798d6dc24e08d70aabc8fb1ecec4696c34e42440ff8a93ae93f058a235b8cf0078699723cbc42a3a579519d048ace5add0bd28d5866fb4d3eb04

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\Tools\qcmtusvc.exe

      Filesize

      81KB

      MD5

      cf9a93ed8f3b472a9c1eb6acb619b9d4

      SHA1

      9725cb577b28f9a71d66af1f5c075423c3f2c66a

      SHA256

      b6d6cbf256f08fe397d23c989d41ff6f4bd60b11751f7e7585cfe5dc534b5e26

      SHA512

      d79581bb5a82a3b396faa20683f5afdcc2933ff525450722142541dbb9450b99f31910983c41420b47dc9b09f2507738d00bcd4047aabbfe23c9a325970394b4

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcfilter.inf

      Filesize

      36KB

      MD5

      4e8ff95823ed15cf1bb13489f88784f5

      SHA1

      f25210d6d26b842ae8a11e3b5c4e18835e4a3b13

      SHA256

      5fa46ab5487d00840642d82eb321aab0c716b19dc9cd21aaa4af74a7b47a5e2e

      SHA512

      6d2056e302c73e7092cbd5badb705ae52fb99b4279c174b524c3656d090434e45a2c0e9c4ed24f4215cff112bbe3ae317776bb00d58a7a27c99266c589bcc667

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcmdm.inf

      Filesize

      44KB

      MD5

      f1ee860f01ef686168926b2eb70da7aa

      SHA1

      5000f8e9c765906819b7bc5ee7ba9a8de8c0f4ee

      SHA256

      db8c72dffd89b859c8d3b511d3c0452d031079c21648d94a8cdfb9c403e492dd

      SHA512

      12823e92a89b2b52d85388f732dcf57303b3bc3f03fa4332244f30d2a180458cb0e58f533c62608f5ac1613b99df4f4b873e8d663e5f5ca9d4cca379bda1e020

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcser.inf

      Filesize

      100KB

      MD5

      66702ca8991184e99b39304cbe964bb3

      SHA1

      99d9453c89e7fedd06f12f3d96b9931e63bdec29

      SHA256

      717d8c9eb75808d711ec31ad97f5cf4699798c95d4336f57cc54ff09aab9ff6e

      SHA512

      e3efbb1be20fc84f31112f75fe412d8e7efaf980038a09e2e9a502810e173dbee0abc3ce4c3a6ac608a84ea9cdeafd5fb32ea44da3e5f39d184363e6167cb950

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcwwan.inf

      Filesize

      72KB

      MD5

      be202547e7b7317e0eaacb373fb65034

      SHA1

      f286b1dff477e7bb1b89028d10ed2164f43ee1c1

      SHA256

      635ec113fb8682ccb237afae4de441882a3edd12526fd7d0f4e0450c54cf8bc6

      SHA512

      b6fab25bfbd1fef0ad4fa25b1f72829a189fcbb98abb1c36d484fa21acfd8cf71efc58dcb869c424ad8aea8469d224f71a653bd7d14fb82561c815ac1e534c1a

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qdbusb.inf

      Filesize

      8KB

      MD5

      028f4b4eea445e57839a0511736cb887

      SHA1

      55074bcd41bc4b90b52f89d7fd20b35885b3ad95

      SHA256

      248c3c0a0a6b2f2a7f7438120906d29c8adbb9ee447dd47d7eb16a7c260f531d

      SHA512

      7faeaccfbd89cfed6bd00fab215e906673505bb64baff4760e7c5fbc385b23b85131d2769bacbaa5f3af3d4cf078ff7d9e61986b5421fb256d64f4726efa7690

    • C:\Program Files\Common Files\System\symsrv.dll

      Filesize

      67KB

      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • C:\Program Files\Common Files\System\symsrv.dll.000

      Filesize

      175B

      MD5

      1130c911bf5db4b8f7cf9b6f4b457623

      SHA1

      48e734c4bc1a8b5399bff4954e54b268bde9d54c

      SHA256

      eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1

      SHA512

      94e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0

    • C:\Users\Admin\AppData\Local\Temp\MSIB5A4.tmp

      Filesize

      1.3MB

      MD5

      ca189a2b762e64d61303bfd4d88fd0a6

      SHA1

      13bf55664fb0345d3931458f75b6039c1213f46a

      SHA256

      dc5094ceb682772d95b427230bfb1af29df90ef67fe8afb08c43a0f2af3f880a

      SHA512

      31bb912f5c5f6cd6577f8529fcbbfc0bf4d0bda5e1904772c57cd942520db7dd1c10657e8695d16418a05763202af1034e4e47a7db8a8be618b9e330e8a544bf

    • C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi

      Filesize

      20.7MB

      MD5

      cde633c7be2c8db52f0922f8a8e0c613

      SHA1

      a9bc8e3c20244d7057843ebb5ce6152f9ef1bd7f

      SHA256

      a7d18848d352986989170eaae01af8439b91b732544662c80c17bad8605353e5

      SHA512

      e32e7bf3c682f070bfae158d98565aa4285bb0154f6655469ad470289845182d757623ad55bd649c39a5c2cd9f8da15aa564d71103084d8fafb336921211009b

    • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISBEW64.exe

      Filesize

      146KB

      MD5

      c3b2acc07bb0610405fc786e3432bef9

      SHA1

      333d5f2b55bd00ad4311ba104af7db984f953924

      SHA256

      9acc6cb5d01a4e4dbc92c8774c6999fab5f0e49f097e83098ba740842f5a2894

      SHA512

      2438e5dd11c8322101d9dc2d0f89ed0b1fc3cb5a65f644a1cf07f4c5a7f353c648e715fb910e09a444b623b3384eecd628e312608bcec63aa3b0107630df32bd

    • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\ISRT.dll

      Filesize

      260KB

      MD5

      a93f625ef42b54c2b0f4d38201e67606

      SHA1

      cbfebc1f736ccfc65562ede79a5ae1a8afb116a1

      SHA256

      e91a865c3d60d9d0bce5d5a0a2f551c5e032d5bc13bc40f85091ce46d38064e0

      SHA512

      805f0d535022de3d03aa191239fd90c54f2f6745bf02e0ce9cbe59ea34eecac7f9ebb600864c7cbcad5d011fa61bdb5b65889136617edc44178f87bd3970b198

    • C:\Users\Admin\AppData\Local\Temp\{E9581AFA-85A4-4212-BD0E-D96E13CEED90}\_isres_0x0409.dll

      Filesize

      540KB

      MD5

      d6bbf7ff6984213c7f1f0f8f07c51e6a

      SHA1

      cfe933fc3b634f7333adec7ec124c14e9d19ac21

      SHA256

      6366e18a8cbf609c9573f341004e5c2725c23a12973affa90ee7bcc7934ae1b2

      SHA512

      a1364c96848f54b241c8e92ed1887ca599255c8046e31af11cd4b0b23d97c00243808dff9086a536c0084d6815223685283844a9e27f2c20c4d3b85a794a9e9d

    • C:\Windows\Installer\MSI4C76.tmp

      Filesize

      1.6MB

      MD5

      ab8d1cf0de0c1594c2093ccf0128e0b8

      SHA1

      ddba6dc5c69ba72c879fb15cc109503adb759fdc

      SHA256

      2f975e52b9e6a99dd3515f7b9bc30e89d39cb44e9fb1a8f3e43ab330df42f0a4

      SHA512

      0a01b500ef221777ffeeacccf47794d1d468bf86a24f53a6558cd21d244dfb614f552047352f8c5c01682322fceab21089bc2a8bef6ad502c81b347b8f8c1fb9

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      2099a144d5782b42ff20cad89329bad9

      SHA1

      84b972b423c2cd372caea63496718099b3a3d1b4

      SHA256

      42cb54434ddf827cfc621bc01f50dadfd794d94aad7ea1a0a84ab9b0727d4817

      SHA512

      04ddd866f26e7b276a10263f4417420d346c38371a7dfec5f4cd296035703a37ea69b21be3d5dd81b822b2789a5b658e964b75f57017ceee2cd5f16ae272dedb

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      885e924b4ba1f6ec9df8f70cd85105bd

      SHA1

      3497ed8c5165351ae604d95571b59573511850e9

      SHA256

      5ef833102f4729d8704ac1ad8c75d4685d72d8f11ad0b20c34d9f64b0533cfe6

      SHA512

      67b15ab2172f6da1b73871a663fc80ace647b64f009d0acd9eddfa7552d898c5c778c79720dc24669be63cb954ed7533c599316541e96678a8a02d4bcf5b49ff

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      232792d659297e7b5269c075bcfdae27

      SHA1

      5be156c549868fd55554aa8f3f232a30a2baf945

      SHA256

      56568082545ae1037550378751c3cc927a0ae8d56e4ec2b8779c6fa5603075bd

      SHA512

      26e8a8f1d6776e426fc0f2718a182c81dcebf2ebb63ef24e0b648da69abe891bdb4145075a1eadc164ff3c0f2dc2bd559464cb61aba2bf3886e1ce1b1a492057

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      cea19d39de95dc2d260a845d36e89ecb

      SHA1

      fb1fa127167bb2e658345efbac3d5b4eb576a8b0

      SHA256

      faf4d15403e148fbd21a62ae75eacba0a9ba707715be01d588a63f371aa3e8f0

      SHA512

      c163b41bc2ac8619bd816dac908d7cfa62b3c32ae1b7f571ea378d2370c04f17bb91b92864e800ea049c1af39dfb6951f58853d585e6acea00957ba9fa39d827

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      38KB

      MD5

      6ba2b4c7cceed0f8b02d568f671a809c

      SHA1

      b50783a95d0981dd30be6c843bfb855ce6334b8c

      SHA256

      1617b9a415734ae7ad2669acab0e2e5b3f77d0ec2dd96b15a15d062b051f0d5c

      SHA512

      06a616afd0a240f170db07c9ca9af60d74b2e199bdb69c912249d128851fd0a465ae28a137a8077417c0e756e7ee942826efc9c226a872cea815d74324bc0ae8

    • C:\Windows\System32\DriverStore\Temp\{3bc419e3-d90d-7543-bf66-6c9f22b3c56f}\ndis\6.2\amd64\qcusbwwan.sys

      Filesize

      504KB

      MD5

      4999657681bacef73fd6c5162a3bbfb5

      SHA1

      5d062c1acc28c4e3852043bbbdd87266f22dc478

      SHA256

      2d759dfd3a6623edd3b2f1634e6192815c25952094ae72cfbbd9ea46d25f7226

      SHA512

      637295c1c467316268268c2a2b529e0a0175c471807c6cddedf83ddfa2537554720bc53cbabf3864d58c0fb7cd41669805b842c0c58a06caf5d6243143ece290

    • C:\Windows\System32\DriverStore\Temp\{6a2a49cf-717e-9345-bf76-b5391c4ab520}\filter\amd64\SET5447.tmp

      Filesize

      39KB

      MD5

      45ef50b1446371ec2411e6ec6f6dabab

      SHA1

      d2e78f2eba854b57626e69fd9298cd390d76f544

      SHA256

      65b7baabfcb0788147b1a5bb03083008f6040f6c321b6a5e2892680c5eec9abd

      SHA512

      5f0377571bd44c83fbd64b8406fcfcf47aef3cd5308d664193d364f978e87c67aa00fd456cc8647ce06381e6c9c6c621a16b5708330776091ca3c6b130957b37

    • C:\Windows\System32\DriverStore\Temp\{8df4381b-84e7-5741-ac54-3724a22ad8cf}\SET62CE.tmp

      Filesize

      95KB

      MD5

      582be70e74fd908714af436aa546c119

      SHA1

      b8179d1f818322da5593d19646e646084ec846e7

      SHA256

      8c3208d04d1c5fe011659b97692a024df5a607f1a480072127bb0f47073aeffa

      SHA512

      dce438135be6786e57eda011b786596c751e3ab7bd15e5553ac7643f54d7014aff6d723c52732d306d70054c3a9980968e71fd14dd1480590290fe34f9134a17

    • C:\Windows\System32\DriverStore\Temp\{9191596c-bc20-da46-9da3-59ece6bf066a}\SET5EA6.tmp

      Filesize

      95KB

      MD5

      acdc05e308c96515b4b8eda582b1191a

      SHA1

      9ed26a48419a8435cb6982e6d1d86585213621ee

      SHA256

      550507c87bdd89d0619328529fefee2933736c85d239367c5e429e0d6febd07c

      SHA512

      1c7bbbc1144e66cc87977074f73bd6c86ba05ca21fadf7f8ac81088fca6776a20fb5d260c366006100adb766697f91e4f2cd4290d2662ec52b0db60dbff93963

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      37KB

      MD5

      20427777c567c78b40f4319150dc415b

      SHA1

      f0e02327b7aa2601a406a2baf947551560601034

      SHA256

      6b11a1b660b37d904114e4e6054f0083af2b8ac84b1b560537a4985b6ca4ab7a

      SHA512

      b7147d1456657720f8785067294a97b52b3eb0db1ed02e00568e12715ef4ae510e17c6e9c8aa544f3ded575240a87f7505b0f6126862b7f980bf550e073e5685

    • memory/432-11-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/432-9-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3116-203-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3116-200-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3692-81-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3692-64-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3692-93-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3692-498-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3692-13-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3732-77-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3732-497-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3732-94-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3732-52-0x0000000003BA0000-0x0000000003C29000-memory.dmp

      Filesize

      548KB

    • memory/3732-45-0x0000000003A20000-0x0000000003AC7000-memory.dmp

      Filesize

      668KB

    • memory/3732-46-0x0000000003A20000-0x0000000003AC7000-memory.dmp

      Filesize

      668KB

    • memory/3732-27-0x0000000003440000-0x00000000035F5000-memory.dmp

      Filesize

      1.7MB

    • memory/3732-22-0x0000000003440000-0x00000000035F5000-memory.dmp

      Filesize

      1.7MB

    • memory/3732-18-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/4396-205-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/4396-495-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/5076-85-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/5076-4-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/5076-63-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/5076-78-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/5076-92-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/5076-499-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB