Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 05:05

General

  • Target

    Internet Download Manager/IDMan.exe

  • Size

    5.7MB

  • MD5

    0cb2421a44f78d903f26fdacba065d63

  • SHA1

    5c91b53852b055865e46d213679cb76e99905c9a

  • SHA256

    cbc46abe4e9a201d366cdd95ae2d34776328b6dd547c8487274006cec26a793a

  • SHA512

    8678d1aba5cef43473501f793253d6244bff78027195beb1225081beedf3097f6c346aeced7c7df15d539ad0dfd41a9e240c44166e3458f8c7cfcddcb5d07d19

  • SSDEEP

    98304:hkGfMJBeiJ9a3N8rP4j18frP3wbzWFimaI7dlo:OhBeiJ9adygbzWFimaI7dl

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 58 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 26 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMan.exe
    "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMan.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
        3⤵
        • Registers COM server for autorun
        • Modifies registry class
        PID:400
    • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIntegrator64.exe
      "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIntegrator64.exe" -runcm
      2⤵
      • Registers COM server for autorun
      • Modifies registry class
      PID:5064
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
        3⤵
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4908
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.0.2118315443\537758971" -parentBuildID 20230214051806 -prefsHandle 1820 -prefMapHandle 1768 -prefsLen 22244 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a9eb5a1-248b-4997-b79b-5d4f5750c4d1} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 1900 238fa80dd58 gpu
          4⤵
            PID:4796
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.1.1523417625\1942286904" -parentBuildID 20230214051806 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 23095 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52e5a7cb-b75d-475a-a6c2-d1632a753dcc} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 2496 238eda89c58 socket
            4⤵
              PID:4204
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.2.1086253800\1233632048" -childID 1 -isForBrowser -prefsHandle 3352 -prefMapHandle 3348 -prefsLen 23133 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52bb8a92-1904-4f91-84c1-accbea3796fe} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 3364 238fd86f658 tab
              4⤵
                PID:2608
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.3.598464645\1286211272" -childID 2 -isForBrowser -prefsHandle 3188 -prefMapHandle 3204 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2591e3bf-e61c-4596-a096-0feead935948} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 4092 238eda85c58 tab
                4⤵
                  PID:2644
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.4.1596344055\1237392355" -childID 3 -isForBrowser -prefsHandle 4948 -prefMapHandle 4936 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e3090d2-ce8e-4d30-b653-621db888cdcf} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 4960 23900e05f58 tab
                  4⤵
                    PID:1408
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.5.27725926\254837962" -childID 4 -isForBrowser -prefsHandle 5100 -prefMapHandle 5104 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {911e6113-f864-4820-835a-2181d47497ff} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 5092 23900e06258 tab
                    4⤵
                      PID:3140
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.6.551726362\1348121301" -childID 5 -isForBrowser -prefsHandle 5284 -prefMapHandle 5288 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65e0fed9-f7b9-40db-906a-4c7c38acecab} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 5264 23900e06558 tab
                      4⤵
                        PID:2960
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.7.1373569745\1972952893" -childID 6 -isForBrowser -prefsHandle 3380 -prefMapHandle 3512 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b127a8c1-c024-4ab2-9fba-78725fd41e65} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 3460 238fd24c058 tab
                        4⤵
                          PID:5456
                    • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\Uninstall.exe
                      "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\Uninstall.exe" -instdriv
                      2⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:1468
                      • C:\Windows\system32\RUNDLL32.EXE
                        "C:\Windows\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\idmwfp.inf
                        3⤵
                        • Adds Run key to start application
                        • Drops file in Windows directory
                        PID:4524
                        • C:\Windows\system32\runonce.exe
                          "C:\Windows\system32\runonce.exe" -r
                          4⤵
                          • Checks processor information in registry
                          PID:4808
                          • C:\Windows\System32\grpconv.exe
                            "C:\Windows\System32\grpconv.exe" -o
                            5⤵
                              PID:5424
                        • C:\Windows\SysWOW64\net.exe
                          "C:\Windows\System32\net.exe" start IDMWFP
                          3⤵
                            PID:5584
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 start IDMWFP
                              4⤵
                                PID:5668
                            • C:\Windows\SysWOW64\net.exe
                              "C:\Windows\System32\net.exe" start IDMWFP
                              3⤵
                                PID:5808
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 start IDMWFP
                                  4⤵
                                    PID:5912
                                • C:\Windows\SysWOW64\net.exe
                                  "C:\Windows\System32\net.exe" start IDMWFP
                                  3⤵
                                    PID:5972
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 start IDMWFP
                                      4⤵
                                        PID:6024
                                    • C:\Windows\SysWOW64\net.exe
                                      "C:\Windows\System32\net.exe" start IDMWFP
                                      3⤵
                                        PID:6056
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 start IDMWFP
                                          4⤵
                                            PID:6108
                                        • C:\Windows\SysWOW64\net.exe
                                          "C:\Windows\System32\net.exe" start IDMWFP
                                          3⤵
                                            PID:6128
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 start IDMWFP
                                              4⤵
                                                PID:5252
                                            • C:\Windows\SysWOW64\net.exe
                                              "C:\Windows\System32\net.exe" start IDMWFP
                                              3⤵
                                                PID:5312
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 start IDMWFP
                                                  4⤵
                                                    PID:5368
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                  3⤵
                                                    PID:5400
                                                    • C:\Windows\system32\regsvr32.exe
                                                      /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                      4⤵
                                                      • Registers COM server for autorun
                                                      PID:5388
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                  2⤵
                                                    PID:3300
                                                    • C:\Windows\system32\regsvr32.exe
                                                      /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                      3⤵
                                                      • Registers COM server for autorun
                                                      PID:5680
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIECC64.dll"
                                                    2⤵
                                                      PID:3240
                                                      • C:\Windows\system32\regsvr32.exe
                                                        /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIECC64.dll"
                                                        3⤵
                                                        • Registers COM server for autorun
                                                        • Modifies registry class
                                                        PID:5584
                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMGetAll64.dll"
                                                      2⤵
                                                        PID:5604
                                                        • C:\Windows\system32\regsvr32.exe
                                                          /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMGetAll64.dll"
                                                          3⤵
                                                          • Registers COM server for autorun
                                                          • Modifies registry class
                                                          PID:5664
                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                        "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\downlWithIDM64.dll"
                                                        2⤵
                                                          PID:5592
                                                          • C:\Windows\system32\regsvr32.exe
                                                            /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\downlWithIDM64.dll"
                                                            3⤵
                                                            • Registers COM server for autorun
                                                            • Modifies registry class
                                                            PID:5708
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2096
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{a0f10917-df82-2948-96f6-aed77e13f681}\idmwfp.inf" "9" "4d4cf61db" "0000000000000148" "WinSta0\Default" "0000000000000160" "208" "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager"
                                                          2⤵
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          • Checks SCSI registry key(s)
                                                          • Modifies data under HKEY_USERS
                                                          PID:4432
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf" "0" "4d4cf61db" "0000000000000160" "WinSta0\Default"
                                                          2⤵
                                                          • Drops file in Drivers directory
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1416

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\activity-stream.discovery_stream.json.tmp

                                                        Filesize

                                                        26KB

                                                        MD5

                                                        e7e5f5907f22603bd7e6ab1bc06ae7fe

                                                        SHA1

                                                        7265f21f16e5d56ed82fc83e3ffd618f8312362e

                                                        SHA256

                                                        80005228b7efb8fcd8383f24f4d48224593cf8e91851b96e30f97887226dd3de

                                                        SHA512

                                                        c10e8d832c10c909ccc2a0ec76abdda69055c831e43743f09987df98f3da0a0fa431b36cf30e6658f21fc730b2f1f8f64a4457f36471275fe445f0f3b26faa0c

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\cache2\entries\F4EFE37A30D0F14C6AC03FF7949A51CBC2EBC649

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        118816ebc6369a18f2c7419b1f6166b6

                                                        SHA1

                                                        772c30ceb138ea1788a81d4991bd6059072c16bf

                                                        SHA256

                                                        7e75e10afdf69db980375b175a840a7cc08029385075bd0d12ea56ebe5694850

                                                        SHA512

                                                        ec824b8f3d1583979164920a2fbc61aa95885d1b0fe2cf940f92a378045906516b5dad6f19aea156a6bab4b559a0115187af54bb7dbe84e5cdcdd313421358ff

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        c43f75aa80262c07291c46d57224dba7

                                                        SHA1

                                                        8522033090495dea2681cc2d9b42bc149c69d75d

                                                        SHA256

                                                        05393821275186add4d89c7b0cac4bec8e565373c1406f060571b3074c40d1da

                                                        SHA512

                                                        5de8fb808d4a128f28b7aad44b03071321286ac3adce2019663d93dd9311cacd14e83c68829d9e1728195e50fdf1b9737ec6dfb4b0c65e102ba1257f395179cc

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        442KB

                                                        MD5

                                                        85430baed3398695717b0263807cf97c

                                                        SHA1

                                                        fffbee923cea216f50fce5d54219a188a5100f41

                                                        SHA256

                                                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                        SHA512

                                                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                        Filesize

                                                        8.0MB

                                                        MD5

                                                        a01c5ecd6108350ae23d2cddf0e77c17

                                                        SHA1

                                                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                        SHA256

                                                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                        SHA512

                                                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                      • C:\Users\Admin\AppData\Local\Temp\{A0F10~1\idmwfp64.sys

                                                        Filesize

                                                        169KB

                                                        MD5

                                                        7d55ad6b428320f191ed8529701ac2fa

                                                        SHA1

                                                        515c36115e6eba2699afbf196ae929f56dc8fe4c

                                                        SHA256

                                                        753a1386e7b37ee313db908183afe7238f1a2aec5e6c1e59e9c11d471b6aaa8d

                                                        SHA512

                                                        a260aae4ff4f064b10388d88bb0cb9ea547ed0bc02c88dc1770935207e0429471d8cd60fcc5f9ee51ecd34767bf7d44c75ea6fbe427c39cc4114aad25100f40d

                                                      • C:\Users\Admin\AppData\Local\Temp\{a0f10917-df82-2948-96f6-aed77e13f681}\idmwfp.inf

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        f8f346d967dcb225c417c4cf3ab217a0

                                                        SHA1

                                                        daca3954f2a882f220b862993b0d5ddf0f207e34

                                                        SHA256

                                                        a54e0ac05254a464180e30f21a6b26651e7495427353bba9c246ba1d2388e7cc

                                                        SHA512

                                                        760c2914f3e937a2a3443a032cf74b68b6d24d082d0f50d65058a0fd87d8eeab229fb8d3105e442f0b3b0b2f3824439981951266425512e51e7ff36669a652fa

                                                      • C:\Users\Admin\AppData\Roaming\IDM\idmfc.dat

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        c7d10a7918d11626fb6c317b581ed710

                                                        SHA1

                                                        44093be676fcc8f2bb22c0307a714fef8fdbcc90

                                                        SHA256

                                                        63474fcb3d23202a24c74ac8db3b796d60df16db0244f2e03e7fded58bd32c11

                                                        SHA512

                                                        4707c58f44dea8bd093299bc2eebc049f51f0eb9e545f323ae1f667edb8b10f71f761d4fe050dd382fd6e9e09a0ae9aa370a2aed2c4ec586639fecb18235abf0

                                                      • C:\Users\Admin\AppData\Roaming\IDM\urlexclist.dat

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        aee43ab150a20fcbacae2088984f2b0e

                                                        SHA1

                                                        4bc10452ecc2fb8a3f298696d8ba34b39476368e

                                                        SHA256

                                                        49cc9662b3c44f3eefe6a6fa967ca34e0da9606d451a6c408ee295ccef01e852

                                                        SHA512

                                                        39f585b985db1a708bec52c37a6a17055939622e4e577f4394a31d94e875cd1c04a4af69bee00568c1a0d392a889a0a7dd7b5608c03c6d350f0ca4c84650b32b

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                        Filesize

                                                        997KB

                                                        MD5

                                                        fe3355639648c417e8307c6d051e3e37

                                                        SHA1

                                                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                        SHA256

                                                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                        SHA512

                                                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                        Filesize

                                                        116B

                                                        MD5

                                                        3d33cdc0b3d281e67dd52e14435dd04f

                                                        SHA1

                                                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                        SHA256

                                                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                        SHA512

                                                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                        Filesize

                                                        479B

                                                        MD5

                                                        49ddb419d96dceb9069018535fb2e2fc

                                                        SHA1

                                                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                        SHA256

                                                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                        SHA512

                                                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                        Filesize

                                                        372B

                                                        MD5

                                                        8be33af717bb1b67fbd61c3f4b807e9e

                                                        SHA1

                                                        7cf17656d174d951957ff36810e874a134dd49e0

                                                        SHA256

                                                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                        SHA512

                                                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                        Filesize

                                                        11.8MB

                                                        MD5

                                                        33bf7b0439480effb9fb212efce87b13

                                                        SHA1

                                                        cee50f2745edc6dc291887b6075ca64d716f495a

                                                        SHA256

                                                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                        SHA512

                                                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        688bed3676d2104e7f17ae1cd2c59404

                                                        SHA1

                                                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                        SHA256

                                                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                        SHA512

                                                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        937326fead5fd401f6cca9118bd9ade9

                                                        SHA1

                                                        4526a57d4ae14ed29b37632c72aef3c408189d91

                                                        SHA256

                                                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                        SHA512

                                                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\prefs-1.js

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        7d128bd475f84eb7579056948c867acf

                                                        SHA1

                                                        54d9329220bb00fc37c9fd389b41cc7ba86ef652

                                                        SHA256

                                                        a5b025813894ab6288b58fa9b1237c10a58364fedebfe866025bd5c0ffab13fa

                                                        SHA512

                                                        445547f0f470f7d052c15d16534fd6769b09d968991f36ae04ad044c96c174b8d9b18ade299cfc117502ec52d8a026793ce326f02e05edcd9b1d2e4a6894c79b

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\prefs-1.js

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        d191c926d7a979d2596490a77fd21a5a

                                                        SHA1

                                                        6f323205d6841972f6d194e6fa06e3ccd6b20065

                                                        SHA256

                                                        b7140d70ce3770e0cfd32fc6466d08578a382beeee97e8fcc6f1b5c7e50a246e

                                                        SHA512

                                                        7eca2c9f21bd4ebafffab06985d51f04d09e20972c448014254c558a2f74b32d5afae0a7660ceb2dba0b864381b5e409b801746acf6acf2822010bee6ac32943

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ue3bcu6m.default-release\sessionstore-backups\recovery.jsonlz4

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        435739da8cf61f3488bff4f134366867

                                                        SHA1

                                                        affbd71d1b4de7cecc0edf25eb89cfeeefca0ac2

                                                        SHA256

                                                        833f6fe16b34cb0d80b6cc82f7080a5a60b8e97e35c1d27b64f18f0df55aeea7

                                                        SHA512

                                                        53d3e515351d1def2fb553a4268c5cbf935938c462a59d48acebc0e02afd48377907479f9324a6de20a79d52b6aabc123b519ee46b31657db9aa9830c27c74d0

                                                      • C:\Windows\System32\DriverStore\Temp\{d810200c-cd98-544c-a983-3f23a0cd5731}\SET7948.tmp

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        d5e0819228c5c2fbee1130b39f5908f3

                                                        SHA1

                                                        ce83de8e675bfbca775a45030518c2cf6315e175

                                                        SHA256

                                                        52818c67be219bc3b05c58b40e51b99a65c2f4bcafe38a995610b4ec10928def

                                                        SHA512

                                                        bb397004f2256db781385de3e7e7b7993be8fbb2cb701ead99a7878c2bcca6c9ae4a7aa61c329aeeb6711c8c74081e971e85af38af6b32b58888c932fd51d218

                                                      • memory/1468-33-0x0000000000400000-0x000000000042B000-memory.dmp

                                                        Filesize

                                                        172KB