How to remove MaxxAudioCapture64.dll
- File Details
- Overview
- Analysis
MaxxAudioCapture64.dll
The module MaxxAudioCapture64.dll has been detected as Adware.BrowseFox
File Details
Product Name: |
|
Company Name: |
|
MD5: |
f098571e443b9091c41f5cb53607740f |
Size: |
16 MB |
First Published: |
2017-05-21 16:04:42 (7 years ago) |
Latest Published: |
2019-03-26 00:16:04 (5 years ago) |
Status: |
Adware.BrowseFox (on last analysis) |
|
Analysis Date: |
2019-03-26 00:16:04 (5 years ago) |
%commonappdata%\40e4509d-93ba-4fdd-82c6-1f8445099ea3\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
%commonappdata%\55d1c1d8-68b7-4f45-a1d4-2e298f0fb658\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
%commonappdata%\5c845706-ff23-4f99-b621-f9f45295de0d\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04 (1)\realtekhdaudio\win64 |
%commonappdata%\a1975901-9fd6-4919-a258-61affebce12f\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
%commonappdata%\1d3c3e3d-cbc6-41ba-a870-d492a63261ef\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
%commonappdata%\386c81bc-09d4-4e8b-9032-f9765d160846\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
%commonappdata%\abe72e54-ee2f-427f-a0de-87efc4d403ba\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
%commonappdata%\92447115-c4ab-4d93-9732-459b4e170201\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
%commonappdata%\042d7438-f636-4cce-8e25-2fabf87b491a\dell\drivers\audio_driver_177vg_wn32_6.0.1.7989_a03\realtekhdaudio\win64 |
%commonappdata%\fea332a2-55bd-4aa8-9042-1caecb9a6344\dell\drivers\audio_driver_7877m_wn32_6.0.1.7989_a04\realtekhdaudio\win64 |
|
50.0% |
|
|
22.7% |
|
|
9.1% |
|
|
4.5% |
|
|
4.5% |
|
|
4.5% |
|
|
4.5% |
|
Analysis
Subsystem: |
Windows GUI |
PE Type: |
pe |
OS Bitness: |
64 |
Image Base: |
0x0000000180000000 |
Entry Address: |
0x00e0cb98 |
Name |
Size of data |
MD5 |
RT_CODE |
637952 |
7bd8ba6d8a2e8b81f05ab43641ad6c96 |
.text |
14216704 |
e2f74a36a9200e8a6e6a434e61e76ae0 |
IPPCODE |
521728 |
6cce6d336bca9040b5165d726969ac18 |
.rdata |
1282560 |
0ba64e4845135af4f89f2cdcdca16f2b |
.data |
129536 |
0aee202532cc2d03fda090ae280ccdc5 |
.pdata |
210432 |
f8ab85ebd75a470634472721243da1e3 |
.data1 |
58880 |
fd05b22e9cf4391763863c0c8ebb7413 |
RT_DATA |
9728 |
f3426d953ec43bfd36d80334853f68ff |
.debug_o |
80896 |
c42b59c2bce866c1252ccf75ce2e2cd6 |
.gfids |
512 |
d23ade6f7ca1ad6b08f61f35807fd21c |
IPPDATA |
1536 |
2ab8a36f14ce297de3220bdf1e5dd062 |
.tls |
512 |
bf619eac0cdf3f68d496ea9344137e8b |
.trace |
29696 |
06ffe610b12caa02bb4758cd618a15c5 |
_RDATA |
4608 |
84d685c827415ffc4917717bf8b665d8 |
.rsrc |
16384 |
9bcd59627e74de4899240eef2d394f2b |
.reloc |
25600 |
c919c1185239149b79fdb8d798d0f071 |