GridinSoft Threat Intelligence

mfxplugin64_hw.dll file report

Clean record File reputation report
MD5 d7856abd518ca5ec3606b63541592899
Latest seen 2022-08-26 23:50:42 (3 years ago)
First seen 2020-11-17 13:12:33 (5 years ago)
Size 25 MB
Publisher Intel Corporation

Why it matters

Evidence available for this file

Detection

Latest status is clean for this hash.

Timeline

First seen 2020-11-17 13:12:33 (5 years ago); latest analysis 2022-08-26 23:50:42 (3 years ago).

Publisher context

Company metadata: Intel Corporation. Product metadata: Intel® Media SDK Plugin.

Digital signature

Signed by Microsoft Windows Hardware Compatibility Publisher. ThreatInfo marks this publisher as trusted for this record.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Confirm the hash and publisher match the expected software.
  2. Review the observed locations and signature information below.
  3. Rescan if the file was downloaded from an unknown source or appears in an unusual path.

mfxplugin64_hw.dll is a Windows file recorded in the ThreatInfo database. It is associated with Intel® Media SDK Plugin. The reported company name is Intel Corporation. The current detection status is Clean, based on the latest analysis from 2022-08-26 23:50:42 (3 years ago).

This record is currently marked as clean, but file reputation can depend on the exact path, hash, and source. Compare the MD5 and publisher data below with the file on your system.

Product Name: Intel® Media SDK Plugin
Company Name: Intel Corporation
MD5: d7856abd518ca5ec3606b63541592899
Size: 25 MB
First Published: 2020-11-17 13:12:33 (5 years ago)
Latest Published: 2022-08-26 23:50:42 (3 years ago)
Status: Clean (on last analysis)
Analysis Date: 2022-08-26 23:50:42 (3 years ago)
Signed By: Microsoft Windows Hardware Compatibility Publisher
Status: Trusted Publisher

ThreatInfo marks this publisher as trusted for this record, but the file hash and source should still match the expected software distribution.

%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t125344603\pci
%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t125902622\pci
%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t130820212\pci
%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t125609820\pci
%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t131542425\pci
%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t131218996\pci
%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t131633346\pci
%localappdata%\slimware utilities inc\slimdrivers\backups\20201103t131325475\pci
%localappdata%\innovative solutions\drivermax\agent\uploads\bxljiu2d0b2k5xb40t9375e0a37uupb0anqak4s2ay83k4n672\display
%localappdata%\innovative solutions\drivermax\agent\restore\q41285r1n9722j9812265q895e941ncral9pgson506s5j74bn\display

ThreatInfo has observed mfxplugin64_hw.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

70.6%
11.8%
5.9%
5.9%
5.9%

The strongest geographic signal for this file is Poland with 70.6% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for mfxplugin64_hw.dll is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

mfxplugin64_hw.dll is identified as pe for 64-bit systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Format pe
Architecture 64-bit
Subsystem Windows GUI
Entry point 0x003eebc0
Image base 0x0000000180000000

PE Sections:

Sections 12
Raw data 26657792

Section layout highlights raw-size concentration, repeated names, packer markers, and hashes that can be compared across related samples.

.text 4389888 bytes · 16.5% of section data
MD5 0e65f488b84bec9a764023dbe97d914b
IPPCODE 102912 bytes · 0.4% of section data
Uncommon name
MD5 18c312e4f200292257ad3cbaa053bee2
.rdata 21483520 bytes · 80.6% of section data
Large raw data
MD5 f79a5d381dcf3bd326e7f31f928afa8c
.data 47104 bytes · 0.2% of section data
MD5 05abb8d93d9975673c47f08504779307
.pdata 101376 bytes · 0.4% of section data
MD5 2d9f85b3d62b6776cf65eec962b4b53c
.data1 68608 bytes · 0.3% of section data
Uncommon name
MD5 ab295e51df8af6e39dd5e669594b0c63
.trace 11264 bytes · 0.0% of section data
Uncommon name
MD5 f66d2f3de2d0e62bccd2fdf3a433e55e
_RDATA 4608 bytes · 0.0% of section data
Uncommon name
MD5 8f543a5daab68822ec43d8c9e18d5aa5
IPPDATA 2560 bytes · 0.0% of section data
Uncommon name
MD5 beb4019e532dd38e5c81f4d07573940b
.debug_o 416256 bytes · 1.6% of section data
Uncommon name
MD5 cd16f13d785c1c2cfce2c6d072c3eb95
.rsrc 1024 bytes · 0.0% of section data
MD5 fc765459e7261e6ad71553c5630001a8
.reloc 28672 bytes · 0.1% of section data
MD5 69f2ad155444396e4dda99d861322b4e

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

Report conclusion

This hash is currently recorded as clean

Use the MD5, publisher, signature, and observed paths in this report to verify that the file on your device is the same copy described here.

Scan with GridinSoft Anti-Malware Use a local scan if the file origin or behavior is unclear. Check this hash on VirusTotal

Recommended next steps

  • Compare the local file MD5 with d7856abd518ca5ec3606b63541592899.
  • Check the file path, publisher, and signature against the details in this report.
  • Run a GridinSoft scan if the source, path, or behavior looks unusual.