Analysis

  • max time kernel
    91s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 13:32

General

  • Target

    2025-01-23_ef5b79d11d56ac638acea43040ba6e2e_floxif_icedid.exe

  • Size

    22.2MB

  • MD5

    ef5b79d11d56ac638acea43040ba6e2e

  • SHA1

    be50d85741ddf0c0b28b55e340b330824ec341e8

  • SHA256

    a3423bf9cd6d13981e3efb81bd2d4861b2606d1bfcca8472e1ade9a8f87bd905

  • SHA512

    6381b6c4ef8de0fc48c564c9e02f6df1d562434ad3ddf86fa4a456b9ca49847f3b8c3f14caecfc88aa2a340df055e6b7a10ca1f6db22ff2b67764192df283052

  • SSDEEP

    393216:6XePsQXKIQ2A6p/jJicojuCXiv3vMBnz4CFxDqg9u4PS6n4CEJXE0wEKD3/LR:6XePsQXKx6liUCXk3EmCFpq4PznwXDwB

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 47 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 29 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-23_ef5b79d11d56ac638acea43040ba6e2e_floxif_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-23_ef5b79d11d56ac638acea43040ba6e2e_floxif_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /x {D9FB7F91-9687-4B09-894D-072903CADEA4} /passive
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4048
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1140
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 75C939395108F4B0243364183E18C72B C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{495A1662-0AF9-4F23-A078-F452A716F764}
        3⤵
        • Executes dropped EXE
        PID:732
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DA0E2E24-116F-4CD0-A1DA-FC51D7C76AC7}
        3⤵
        • Executes dropped EXE
        PID:4892
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{63823BAB-966E-4827-90F7-05B186DB6D88}
        3⤵
        • Executes dropped EXE
        PID:3504
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BAA28A84-2C39-4D35-9B67-9F2592AEEA33}
        3⤵
        • Executes dropped EXE
        PID:1216
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D9A1E795-EB21-47EB-A984-C09EE5E0AB27}
        3⤵
        • Executes dropped EXE
        PID:3268
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A3E69E89-E7DD-431B-B6A8-CAA381426E89}
        3⤵
        • Executes dropped EXE
        PID:4988
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E007840E-A04A-48D1-9834-B3711756C1E4}
        3⤵
        • Executes dropped EXE
        PID:2716
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{564A5FD7-FD12-415D-B966-7E4E8955BD42}
        3⤵
        • Executes dropped EXE
        PID:2012
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{200CB393-2A23-4B96-9380-CAA322599286}
        3⤵
        • Executes dropped EXE
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0AC2963B-8D3D-494C-A3C0-57737211D05F}
        3⤵
        • Executes dropped EXE
        PID:2928
      • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5457C7D7-C3AC-4905-AB94-1E45B5E02FF2}
        3⤵
        • Executes dropped EXE
        PID:3888
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3460
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding F48C2C4AF45DB4C792BF02BAB80F5C15 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4384
        • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\DriverInstaller64.exe
          "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\DriverInstaller64.exe" "/I|0|C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious use of SetWindowsHookEx
          PID:2840
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:2728
    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\Tools\qcmtusvc.exe
      "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\Tools\qcmtusvc.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3668
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcfilter.inf" "9" "4f0333d67" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Manipulates Digital Signatures
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{30698911-279d-4b4c-a29e-bcb93121acf5} Global\{347f4293-274d-ab4c-8659-1b1e23e74b9a} C:\Windows\System32\DriverStore\Temp\{153eddc0-9dec-7b4b-bc52-932f8cb499ed}\qcfilter.inf C:\Windows\System32\DriverStore\Temp\{153eddc0-9dec-7b4b-bc52-932f8cb499ed}\qcfilter.cat
          3⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:4304
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcser.inf" "9" "4417f2877" "0000000000000158" "WinSta0\Default" "000000000000015C" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2156
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcmdm.inf" "9" "4f8e1879b" "000000000000015C" "WinSta0\Default" "0000000000000154" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:740
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcwwan.inf" "9" "47c727a63" "0000000000000154" "WinSta0\Default" "0000000000000148" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2528
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qdbusb.inf" "9" "4d5e0b807" "000000000000017C" "WinSta0\Default" "0000000000000148" "208" "C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e585e87.rbs

      Filesize

      37KB

      MD5

      3515fd9c78206ae831578f6a734550b9

      SHA1

      edacd77a1e12d79e8bbc3b21f66173b2de20d33b

      SHA256

      1e833d609c1fd5826e10364605aeb140369db08a251f016f85c3aded1571c062

      SHA512

      6e1de53c4c3e60e4a919bdb76c9eaf6bc12205761e52e65afaea0129c9200cfb2ea11712286a8f6fe7f49579424aeb2eabe7ab321f640abd58687f8961bded00

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\ndis\6.2\amd64\qcusbwwan.sys

      Filesize

      504KB

      MD5

      4999657681bacef73fd6c5162a3bbfb5

      SHA1

      5d062c1acc28c4e3852043bbbdd87266f22dc478

      SHA256

      2d759dfd3a6623edd3b2f1634e6192815c25952094ae72cfbbd9ea46d25f7226

      SHA512

      637295c1c467316268268c2a2b529e0a0175c471807c6cddedf83ddfa2537554720bc53cbabf3864d58c0fb7cd41669805b842c0c58a06caf5d6243143ece290

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qcfilter.cat

      Filesize

      94KB

      MD5

      184fb15f93f73790d5dfae0a22557ee4

      SHA1

      f3de31f1db7e76fd26d7ad4953b0a01c070da8ba

      SHA256

      2443015b8822a3793c141571135ef1cb79f324700d33266103e3ba599e1b6c21

      SHA512

      5e6e8a7fc5187f886e33769028f2f4aa5410615c681eb0aa0136ac08c81954c86d7a58b000004294dc60239d8f76c3bda9eafcfd3f1ad7d1c86bd3eb6ad2ea3e

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qcser.cat

      Filesize

      95KB

      MD5

      acdc05e308c96515b4b8eda582b1191a

      SHA1

      9ed26a48419a8435cb6982e6d1d86585213621ee

      SHA256

      550507c87bdd89d0619328529fefee2933736c85d239367c5e429e0d6febd07c

      SHA512

      1c7bbbc1144e66cc87977074f73bd6c86ba05ca21fadf7f8ac81088fca6776a20fb5d260c366006100adb766697f91e4f2cd4290d2662ec52b0db60dbff93963

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qcwwan.cat

      Filesize

      94KB

      MD5

      a08b4295c74ebc18d6a5f281ca2c3eea

      SHA1

      9718561dd5f541854bb3dceb0554ee780f4cad43

      SHA256

      be76010e324e2fcd9990a82265ff8757375f45fc692202ebf5d974b85fcbc777

      SHA512

      170b32913c40c94ef7d32d2c2c011b6671feb64a91b1ba9c5f0ba44db79264b577871bedbc58ff308ea98926f767823432a86f0749208c1092460d6adb5c92f9

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qdbusb.cat

      Filesize

      95KB

      MD5

      582be70e74fd908714af436aa546c119

      SHA1

      b8179d1f818322da5593d19646e646084ec846e7

      SHA256

      8c3208d04d1c5fe011659b97692a024df5a607f1a480072127bb0f47073aeffa

      SHA512

      dce438135be6786e57eda011b786596c751e3ab7bd15e5553ac7643f54d7014aff6d723c52732d306d70054c3a9980968e71fd14dd1480590290fe34f9134a17

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qdss\amd64\qdbusb.sys

      Filesize

      44KB

      MD5

      c6ea8d40d2bf25d9011c37e27d65c484

      SHA1

      9d00f36c1ba545c2c140aa12e6ff0b5917b17f8b

      SHA256

      ed89b3315d5ff28ccde22b90680d44c7ad8de630601baa2921c96c25d85aae3f

      SHA512

      b54d2e8dd7692ea4f9308be891330d277ba7b592e2a40b1a330176668d1e3aa7243cd792c70743d1f978bcf992116c4c6f28f2cb02fd4536d53cedc9a13e26ea

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\qdss\amd64\wdfcoinstaller01009.dll

      Filesize

      1.6MB

      MD5

      4da5da193e0e4f86f6f8fd43ef25329a

      SHA1

      68a44d37ff535a2c454f2440e1429833a1c6d810

      SHA256

      18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

      SHA512

      b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

    • C:\PROGRA~2\QUALCO~1\QUALCO~1\DRIVER~1\Qualcomm\fre\Windows7\serial\amd64\qcusbser.sys

      Filesize

      239KB

      MD5

      358bc4b7bf9bca41abea485058f9b360

      SHA1

      47974d8e6512497c9ad6a79919e1cd58366d5e97

      SHA256

      6fff206a1def97219541568d76d2077ac5db1daef2c6d995f6ac4a83e57ed898

      SHA512

      1d6de7f4db5f2320889f8e23176b8e6ebacd8ed03fb7bbb62841e105c83fcc6eaa571c89e605f3d41258fa629dd72c5e2305ea7c26855735b1baced84046404a

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\DifxApi\amd64\difxapi.dll

      Filesize

      507KB

      MD5

      9495b07f33ded991c65d9b04945d44c5

      SHA1

      db9d5ec47980eb0709faba0cda283ff99d643b7c

      SHA256

      bf0798d3a4540b15f45c5b329798a2ac532ff693764948b9b4757265e145216e

      SHA512

      36ff4bd8b252f78a91a8e205bda17bd7f159a11f1616f5bf90fa08164201c272efa817c3974680603ab19a2086ce4dc3a26a504ee811d5a530ccc9e8af6d4815

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\DriverInstaller64.exe

      Filesize

      2.2MB

      MD5

      6e0321ff9f386106d64e7b863e1866ea

      SHA1

      f9898d7bdd18691518ff1d615a693922bcc3a26c

      SHA256

      f0cbd9fb9abc814e470a4126d3f7b7bf2fc769c20593b402ad2cb979e4817625

      SHA512

      0449c4ee6fb9798d6dc24e08d70aabc8fb1ecec4696c34e42440ff8a93ae93f058a235b8cf0078699723cbc42a3a579519d048ace5add0bd28d5866fb4d3eb04

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\Tools\qcmtusvc.exe

      Filesize

      81KB

      MD5

      cf9a93ed8f3b472a9c1eb6acb619b9d4

      SHA1

      9725cb577b28f9a71d66af1f5c075423c3f2c66a

      SHA256

      b6d6cbf256f08fe397d23c989d41ff6f4bd60b11751f7e7585cfe5dc534b5e26

      SHA512

      d79581bb5a82a3b396faa20683f5afdcc2933ff525450722142541dbb9450b99f31910983c41420b47dc9b09f2507738d00bcd4047aabbfe23c9a325970394b4

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcfilter.inf

      Filesize

      36KB

      MD5

      4e8ff95823ed15cf1bb13489f88784f5

      SHA1

      f25210d6d26b842ae8a11e3b5c4e18835e4a3b13

      SHA256

      5fa46ab5487d00840642d82eb321aab0c716b19dc9cd21aaa4af74a7b47a5e2e

      SHA512

      6d2056e302c73e7092cbd5badb705ae52fb99b4279c174b524c3656d090434e45a2c0e9c4ed24f4215cff112bbe3ae317776bb00d58a7a27c99266c589bcc667

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcmdm.inf

      Filesize

      44KB

      MD5

      f1ee860f01ef686168926b2eb70da7aa

      SHA1

      5000f8e9c765906819b7bc5ee7ba9a8de8c0f4ee

      SHA256

      db8c72dffd89b859c8d3b511d3c0452d031079c21648d94a8cdfb9c403e492dd

      SHA512

      12823e92a89b2b52d85388f732dcf57303b3bc3f03fa4332244f30d2a180458cb0e58f533c62608f5ac1613b99df4f4b873e8d663e5f5ca9d4cca379bda1e020

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcser.inf

      Filesize

      100KB

      MD5

      66702ca8991184e99b39304cbe964bb3

      SHA1

      99d9453c89e7fedd06f12f3d96b9931e63bdec29

      SHA256

      717d8c9eb75808d711ec31ad97f5cf4699798c95d4336f57cc54ff09aab9ff6e

      SHA512

      e3efbb1be20fc84f31112f75fe412d8e7efaf980038a09e2e9a502810e173dbee0abc3ce4c3a6ac608a84ea9cdeafd5fb32ea44da3e5f39d184363e6167cb950

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qcwwan.inf

      Filesize

      72KB

      MD5

      be202547e7b7317e0eaacb373fb65034

      SHA1

      f286b1dff477e7bb1b89028d10ed2164f43ee1c1

      SHA256

      635ec113fb8682ccb237afae4de441882a3edd12526fd7d0f4e0450c54cf8bc6

      SHA512

      b6fab25bfbd1fef0ad4fa25b1f72829a189fcbb98abb1c36d484fa21acfd8cf71efc58dcb869c424ad8aea8469d224f71a653bd7d14fb82561c815ac1e534c1a

    • C:\Program Files (x86)\QUALCOMM Incorporated\Qualcomm USB Drivers For Windows\DriverPackage\Qualcomm\fre\Windows7\qdbusb.inf

      Filesize

      8KB

      MD5

      028f4b4eea445e57839a0511736cb887

      SHA1

      55074bcd41bc4b90b52f89d7fd20b35885b3ad95

      SHA256

      248c3c0a0a6b2f2a7f7438120906d29c8adbb9ee447dd47d7eb16a7c260f531d

      SHA512

      7faeaccfbd89cfed6bd00fab215e906673505bb64baff4760e7c5fbc385b23b85131d2769bacbaa5f3af3d4cf078ff7d9e61986b5421fb256d64f4726efa7690

    • C:\Program Files\Common Files\System\symsrv.dll

      Filesize

      67KB

      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • C:\Program Files\Common Files\System\symsrv.dll.000

      Filesize

      175B

      MD5

      1130c911bf5db4b8f7cf9b6f4b457623

      SHA1

      48e734c4bc1a8b5399bff4954e54b268bde9d54c

      SHA256

      eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1

      SHA512

      94e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0

    • C:\Users\Admin\AppData\Local\Temp\MSID282.tmp

      Filesize

      1.3MB

      MD5

      ca189a2b762e64d61303bfd4d88fd0a6

      SHA1

      13bf55664fb0345d3931458f75b6039c1213f46a

      SHA256

      dc5094ceb682772d95b427230bfb1af29df90ef67fe8afb08c43a0f2af3f880a

      SHA512

      31bb912f5c5f6cd6577f8529fcbbfc0bf4d0bda5e1904772c57cd942520db7dd1c10657e8695d16418a05763202af1034e4e47a7db8a8be618b9e330e8a544bf

    • C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi

      Filesize

      20.7MB

      MD5

      cde633c7be2c8db52f0922f8a8e0c613

      SHA1

      a9bc8e3c20244d7057843ebb5ce6152f9ef1bd7f

      SHA256

      a7d18848d352986989170eaae01af8439b91b732544662c80c17bad8605353e5

      SHA512

      e32e7bf3c682f070bfae158d98565aa4285bb0154f6655469ad470289845182d757623ad55bd649c39a5c2cd9f8da15aa564d71103084d8fafb336921211009b

    • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISBEW64.exe

      Filesize

      146KB

      MD5

      c3b2acc07bb0610405fc786e3432bef9

      SHA1

      333d5f2b55bd00ad4311ba104af7db984f953924

      SHA256

      9acc6cb5d01a4e4dbc92c8774c6999fab5f0e49f097e83098ba740842f5a2894

      SHA512

      2438e5dd11c8322101d9dc2d0f89ed0b1fc3cb5a65f644a1cf07f4c5a7f353c648e715fb910e09a444b623b3384eecd628e312608bcec63aa3b0107630df32bd

    • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\ISRT.dll

      Filesize

      260KB

      MD5

      a93f625ef42b54c2b0f4d38201e67606

      SHA1

      cbfebc1f736ccfc65562ede79a5ae1a8afb116a1

      SHA256

      e91a865c3d60d9d0bce5d5a0a2f551c5e032d5bc13bc40f85091ce46d38064e0

      SHA512

      805f0d535022de3d03aa191239fd90c54f2f6745bf02e0ce9cbe59ea34eecac7f9ebb600864c7cbcad5d011fa61bdb5b65889136617edc44178f87bd3970b198

    • C:\Users\Admin\AppData\Local\Temp\{54A10247-3769-49E3-8286-7F9BF17367BB}\_isres_0x0409.dll

      Filesize

      540KB

      MD5

      d6bbf7ff6984213c7f1f0f8f07c51e6a

      SHA1

      cfe933fc3b634f7333adec7ec124c14e9d19ac21

      SHA256

      6366e18a8cbf609c9573f341004e5c2725c23a12973affa90ee7bcc7934ae1b2

      SHA512

      a1364c96848f54b241c8e92ed1887ca599255c8046e31af11cd4b0b23d97c00243808dff9086a536c0084d6815223685283844a9e27f2c20c4d3b85a794a9e9d

    • C:\Windows\Installer\MSI6703.tmp

      Filesize

      1.6MB

      MD5

      ab8d1cf0de0c1594c2093ccf0128e0b8

      SHA1

      ddba6dc5c69ba72c879fb15cc109503adb759fdc

      SHA256

      2f975e52b9e6a99dd3515f7b9bc30e89d39cb44e9fb1a8f3e43ab330df42f0a4

      SHA512

      0a01b500ef221777ffeeacccf47794d1d468bf86a24f53a6558cd21d244dfb614f552047352f8c5c01682322fceab21089bc2a8bef6ad502c81b347b8f8c1fb9

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      fea42b84c10bff779760b8bc07b7d0cf

      SHA1

      51e9aff294585272e478c196d69682e7cb7f7580

      SHA256

      818e2dec80e96085dc6068bee1c4bbdeea65422749caa9d2e9eb834f6b6f7920

      SHA512

      97ad4aa467cf495794da084449635dfca5d68512d8b8b932e58f83a1cdb579dac5fd0b573aadc36af1600e7e2474613a129858e3311e2d1c80f2187401027893

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      3f5939b71c9895928bd77244a82629f6

      SHA1

      15b9a2af0fa8dcd90ddc13f0e35644a163794855

      SHA256

      1d192c0af6e576c1511e82e8dca7a886f00f91f43b39bed3606779f6bd652ac8

      SHA512

      5ad7acdb26be5a2be9fcef41dc7f21557c6a91e16e777560dbec5ed948e5268799c8f34b7d18ee90f18ea96627b842c5f16efec189b171b0408d47e837824fd0

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      6de5bf8efb50c32a7da47060781d5e2f

      SHA1

      6eb59ff31d9cc1900aeb8fa965b2d07bfe474f4a

      SHA256

      2d8172d08bd45f7f3676a03f5f39045193cbed306bd7dccdfb240b91254a2387

      SHA512

      ed6d133fb6aac3e559ada1f046e711bf551ebd5a7d29bf32388ed2c62718b7872d2d32f6dea39d885b76b6b714d8efa300e197c887f50f1a80800e35245cc6dc

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      a674d9a63eb81aa41456fd992dbcee00

      SHA1

      712b7b157b9a2bda12f9834faadf00e3c7dec8d9

      SHA256

      cc3e3c2f216e39a9fc5205a2805f5d17dd6db630cb6c67811de3824c5830005a

      SHA512

      44e4b398bf2d62c3ba28f4d05134cc5f80527f9e399c89881fe2c6c5b2ea1166647d4bc1f6c209a31753592f887fe16f19120bc5079a859a58b94799aaa42e81

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      064aa48d0614d094e367b330159bc2b4

      SHA1

      19b4bc221b546ef43bf60cd2f24c01c98f1fad38

      SHA256

      4376909717c4765fc126869a935a95c0c61c0d4560e40cf6c726ab7f63d2703f

      SHA512

      ba6d34cba26142609f5e79be47576c1679375011ea631d04b93499213131a736ac726db903ee62189466527dd032a95815d4a99f7df6f4a54cc451b202b4bbfb

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      430852427b51dbb82de98e12339a5a47

      SHA1

      cafe2e69b83dc0f01b07b267dbcf3bb5272bcf0a

      SHA256

      88603affc0e35d4cd87a92ab679bbd40c82fac7193310c4e2989d75021bb8e5e

      SHA512

      488be7566dcb82084335620ad8da1517107096fe0f0da9c303be97e6f67fe1262d7e213a14bf74175e89ecdf826c3bd36372f0597f06053156bec4771d70eac7

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      38KB

      MD5

      75986492ca998b54b03716eb32b96e7a

      SHA1

      3f671de5629c3f306f9ca05567c97749083f30f2

      SHA256

      fbbad5a7c47fa64e4cdf6ebfdf0f038700e1c232907579c8a09c6036265ab2b7

      SHA512

      c281dd65b08f3e0cff35104e7a924dc2b928799917b520870d5ad736f8057bbbe49f1000280203ffc45dd7d17c81cd66d1952cf9f7f5df832995ffa6801f2a87

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      38KB

      MD5

      3a3a8b7794a44710f921bdefbc0919bb

      SHA1

      6e9e38bb43a3c9efcd2ec32ea1ccb82af6a38bd8

      SHA256

      8d0facd6f3de0c58614de58616d569d91cbf68ac4c89f4bcaa8495bcd5317e2d

      SHA512

      66e9cb9d05f719d4521e50c19519de0a976e26fc39296c2452ac7792df6bc5c64c8878daa5e3cc054ccb9b9f2518fa1053bc1a014533bca921e104dfe923da87

    • C:\Windows\System32\DriverStore\Temp\{153eddc0-9dec-7b4b-bc52-932f8cb499ed}\filter\amd64\SET6F03.tmp

      Filesize

      39KB

      MD5

      45ef50b1446371ec2411e6ec6f6dabab

      SHA1

      d2e78f2eba854b57626e69fd9298cd390d76f544

      SHA256

      65b7baabfcb0788147b1a5bb03083008f6040f6c321b6a5e2892680c5eec9abd

      SHA512

      5f0377571bd44c83fbd64b8406fcfcf47aef3cd5308d664193d364f978e87c67aa00fd456cc8647ce06381e6c9c6c621a16b5708330776091ca3c6b130957b37

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      2c5fc5cf0e5953b7e26a2e74c0d183eb

      SHA1

      adb531bd2774c69f860532368c0936ef558a3d20

      SHA256

      a6d5f8c67ff12bda08a0ab3e62789b304f823a1003a347bdb2cc45ac85ab4095

      SHA512

      908ea3be6ffc2fc2262fff5ff9eea48c9ab087c4d184b8298ce1a7883a07d73773a1edbfcd2062f7e9e002ee0f9f08f2b7f9a7ba42e3da1edaea88f73d539669

    • \??\Volume{625ed6c4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e3f5b6b2-575f-4085-9d91-c92b096a7570}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      b17fd39eb002e6e04c269d63dc755621

      SHA1

      f536d94cec29322cd72f7dc913e2058a0e26427d

      SHA256

      7fc338d4a96630a35f28878e91dc9c6e33d5bb2652f81505c3fe3c94a84d9aa7

      SHA512

      1edfc6567cac7115f9eb787c494c999247aea500eeec704d10ba575e00c18d130ae3d62e3a8b2b2d233803edad6bf221ee55526ce21ed57c57f077c562d61208

    • memory/540-68-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/540-74-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/540-79-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/540-4-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/540-529-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/4964-39-0x0000000002C50000-0x0000000002CF7000-memory.dmp

      Filesize

      668KB

    • memory/4964-38-0x0000000002C50000-0x0000000002CF7000-memory.dmp

      Filesize

      668KB

    • memory/4964-44-0x0000000002DD0000-0x0000000002E59000-memory.dmp

      Filesize

      548KB

    • memory/4964-16-0x0000000010000000-0x00000000101B5000-memory.dmp

      Filesize

      1.7MB