How to remove ProcessWatch.exe
- File Details
- Overview
- Analysis
ProcessWatch.exe
The module ProcessWatch.exe has been detected as General Threat
File Details
| Product Name: |
|
| Company Name: |
|
| MD5: |
1b69c06901b4f8fcd0e6ecedc8e47e77 |
| Size: |
3 MB |
| First Published: |
2018-08-14 13:39:06 (7 years ago) |
| Latest Published: |
2022-10-30 23:24:44 (3 years ago) |
| Status: |
General Threat (on last analysis) |
|
| Analysis Date: |
2022-10-30 23:24:44 (3 years ago) |
| %sysdrive%\contenu\logiciels\logiciels anti-malwares\lavasoft ad-aware\lavasoft ad-aware 2007\lavasoft ad-aware 2007 professional edition v7.0.1.3 incl-crack eng-ita-deu- french -esp par nac nacer du 69 lyon xcellent pour windows vista.rar\qw |
| %sysdrive%\z e\a a komputerowe\ochrona komputera\portable ad-aware pro 7.0.1.3\ad-aware_portable_pro_7.0.1.3_en.exe\adaware2007portable |
| %sysdrive%\recycler\s-1-5-21-1715567821-1229272821-682003330-1003\de12584.rar |
| %sysdrive%\backup\photon\copied_from_gabor\store\lavasoft-ad-aware2007 |
| %temp%\rar$exa0.273\lavasoft ad-aware 2008 professional edition |
| %temp%\rar$exa0.165\lavasoft ad-aware 2008 professional edition |
| %temp%\rar$exa0.165\lavasoft ad-aware 2008 professional edition\crack |
| %temp%\rar$exa0.273\lavasoft ad-aware 2008 professional edition\crack |
| %temp%\rar$exa0.168\lavasoft ad-aware 2008 professional edition\crack |
| %temp%\rar$exa0.168\lavasoft ad-aware 2008 professional edition |
|
47.1% |
|
|
29.4% |
|
|
5.9% |
|
|
5.9% |
|
|
5.9% |
|
|
5.9% |
|
| Windows 7 |
52.9% |
|
| Windows 10 |
41.2% |
|
| Windows XP |
5.9% |
|
Analysis
| Subsystem: |
Windows GUI |
| PE Type: |
pe |
| OS Bitness: |
32 |
| Image Base: |
0x00400000 |
| Entry Address: |
0x0017f354 |
| Name |
Size of data |
MD5 |
| .text |
1560576 |
a9b202a703007d0b9ccf6889b0317995 |
| .itext |
8192 |
ca713100b1ab2c6223176ae44a21cc40 |
| .data |
40960 |
033a7c825a6cdbd0d6a2deb0b93f62fe |
| .bss |
36864 |
18747fcb2508eeec79415b32f63f3654 |
| .idata |
16384 |
fd17d4a551895337a771f186064b93e3 |
| .tls |
4096 |
620f0b67a91f7f74151bc5be745b7110 |
| .rdata |
4096 |
59000ead430807af6f78031573ec1750 |
| .reloc |
77824 |
8e5b89fb318f84c97b51532d9059c2f5 |
| .text1 |
327680 |
0ef7722a4e7b3708d2174a41e79d50a9 |
| .adata |
65536 |
fcd6bcb56c1689fcef28b57c22475bad |
| .data1 |
65536 |
bd78243b854d9ffc6ee2889f7788de07 |
| .reloc1 |
65536 |
abfbba3a1e8efbae233ca07b06f1626c |
| .pdata |
1114112 |
68988f4ddc91ad801af32ceaa3fa3238 |
| .rsrc |
307200 |
f87c3af814ba507f99a6d191d7a8cb85 |
| .idata |
8192 |
798dabecc3dca75487b8d2a5d747caed |