Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 05:05

General

  • Target

    Internet Download Manager/IDMan.exe

  • Size

    5.7MB

  • MD5

    0c889b8415364665b7bc6e5fc62725af

  • SHA1

    a93e0c73c53b5f80d9d62b403999794479fab716

  • SHA256

    1e273066687517e46447b352dd2f6c836e7c8109ef7053d286c0dd3432eb8cca

  • SHA512

    922a89714e7cd86e05c62579344cda82cdd531556ab5255ff41a85a58c9cbfe294f9dbb00d4a9cfd94420993587920eb04ef850951cb961612980e049e40f618

  • SSDEEP

    98304:9n4fMJBeiJ9a3N8rP4S18frP3wbzWFimaI7dlo+:RPBeiJ9ad9gbzWFimaI7dl3

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 6 IoCs
  • Registers COM server for autorun 1 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 26 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMan.exe
    "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMan.exe"
    1⤵
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Checks computer location settings
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5076
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
        3⤵
        • Registers COM server for autorun
        • Modifies registry class
        PID:2936
    • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIntegrator64.exe
      "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIntegrator64.exe" -runcm
      2⤵
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4976
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
        3⤵
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.0.846366017\878442320" -parentBuildID 20230214051806 -prefsHandle 1804 -prefMapHandle 1796 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd145415-6e4a-45c8-9db0-d66dda9fdc63} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 1884 198bf70d758 gpu
          4⤵
            PID:2892
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.1.339417804\25763033" -parentBuildID 20230214051806 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 22927 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59f34998-3f29-44d2-9878-c7b460d294b5} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 2476 198b288a258 socket
            4⤵
              PID:1208
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.2.1309350358\1273340483" -childID 1 -isForBrowser -prefsHandle 2836 -prefMapHandle 2888 -prefsLen 22965 -prefMapSize 235121 -jsInitHandle 1312 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {298d8664-4a5c-4864-a34a-b9b6444c0fe3} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 3076 198c263fe58 tab
              4⤵
                PID:3412
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.3.863053965\1927594091" -childID 2 -isForBrowser -prefsHandle 3648 -prefMapHandle 3644 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1312 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {769925e1-26b9-424e-94d9-a644f402e6c0} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 3660 198c4210758 tab
                4⤵
                  PID:1436
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.4.1434047328\902337750" -childID 3 -isForBrowser -prefsHandle 5200 -prefMapHandle 5204 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1312 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6de4e54-4360-493c-8ea4-654979048852} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 4768 198c50d2b58 tab
                  4⤵
                    PID:2876
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.5.279673903\1352161304" -childID 4 -isForBrowser -prefsHandle 2760 -prefMapHandle 5492 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1312 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d0d6165-58e6-41db-b91d-47b8d8613c6a} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 3184 198bfc2e758 tab
                    4⤵
                      PID:1832
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.6.1935131371\1816703589" -childID 5 -isForBrowser -prefsHandle 5540 -prefMapHandle 3172 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1312 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97893a1f-0b59-4f9c-84ee-0fa73a2195fa} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 2876 198bfd56258 tab
                      4⤵
                        PID:3924
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3512.7.980908086\37477135" -childID 6 -isForBrowser -prefsHandle 5744 -prefMapHandle 5748 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1312 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04feabae-679a-4a0c-bd5a-9751b9ed763c} 3512 "\\.\pipe\gecko-crash-server-pipe.3512" 5732 198bfd56b58 tab
                        4⤵
                          PID:3856
                    • C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\Uninstall.exe
                      "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\Uninstall.exe" -instdriv
                      2⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:3172
                      • C:\Windows\system32\RUNDLL32.EXE
                        "C:\Windows\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\idmwfp.inf
                        3⤵
                        • Adds Run key to start application
                        • Drops file in Windows directory
                        PID:4420
                        • C:\Windows\system32\runonce.exe
                          "C:\Windows\system32\runonce.exe" -r
                          4⤵
                          • Checks processor information in registry
                          PID:3924
                          • C:\Windows\System32\grpconv.exe
                            "C:\Windows\System32\grpconv.exe" -o
                            5⤵
                              PID:1324
                        • C:\Windows\SysWOW64\net.exe
                          "C:\Windows\System32\net.exe" start IDMWFP
                          3⤵
                            PID:2248
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 start IDMWFP
                              4⤵
                                PID:4880
                            • C:\Windows\SysWOW64\net.exe
                              "C:\Windows\System32\net.exe" start IDMWFP
                              3⤵
                                PID:4852
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 start IDMWFP
                                  4⤵
                                    PID:3680
                                • C:\Windows\SysWOW64\net.exe
                                  "C:\Windows\System32\net.exe" start IDMWFP
                                  3⤵
                                    PID:5240
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 start IDMWFP
                                      4⤵
                                        PID:5308
                                    • C:\Windows\SysWOW64\net.exe
                                      "C:\Windows\System32\net.exe" start IDMWFP
                                      3⤵
                                        PID:5328
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 start IDMWFP
                                          4⤵
                                            PID:5388
                                        • C:\Windows\SysWOW64\net.exe
                                          "C:\Windows\System32\net.exe" start IDMWFP
                                          3⤵
                                            PID:5416
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 start IDMWFP
                                              4⤵
                                                PID:5468
                                            • C:\Windows\SysWOW64\net.exe
                                              "C:\Windows\System32\net.exe" start IDMWFP
                                              3⤵
                                                PID:5492
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 start IDMWFP
                                                  4⤵
                                                    PID:5544
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                  3⤵
                                                    PID:5576
                                                    • C:\Windows\system32\regsvr32.exe
                                                      /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                      4⤵
                                                      • Registers COM server for autorun
                                                      PID:5600
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                  2⤵
                                                    PID:5808
                                                    • C:\Windows\system32\regsvr32.exe
                                                      /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMShellExt64.dll"
                                                      3⤵
                                                      • Registers COM server for autorun
                                                      • Modifies registry class
                                                      PID:5864
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIECC64.dll"
                                                    2⤵
                                                      PID:5820
                                                      • C:\Windows\system32\regsvr32.exe
                                                        /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMIECC64.dll"
                                                        3⤵
                                                        • Registers COM server for autorun
                                                        • Modifies registry class
                                                        PID:5884
                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMGetAll64.dll"
                                                      2⤵
                                                        PID:5840
                                                        • C:\Windows\system32\regsvr32.exe
                                                          /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\IDMGetAll64.dll"
                                                          3⤵
                                                          • Registers COM server for autorun
                                                          • Modifies registry class
                                                          PID:5908
                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                        "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\downlWithIDM64.dll"
                                                        2⤵
                                                          PID:5852
                                                          • C:\Windows\system32\regsvr32.exe
                                                            /s "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager\downlWithIDM64.dll"
                                                            3⤵
                                                            • Registers COM server for autorun
                                                            • Modifies registry class
                                                            PID:5920
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1744
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{d2235060-6236-5b4d-836d-954f3a6af1b4}\idmwfp.inf" "9" "4d4cf61db" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "C:\Users\Admin\AppData\Local\Temp\Internet Download Manager"
                                                          2⤵
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          • Checks SCSI registry key(s)
                                                          • Modifies data under HKEY_USERS
                                                          PID:1832
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf" "0" "4d4cf61db" "0000000000000148" "WinSta0\Default"
                                                          2⤵
                                                          • Drops file in Drivers directory
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2848

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qzr7kws6.default-release\activity-stream.discovery_stream.json.tmp

                                                        Filesize

                                                        29KB

                                                        MD5

                                                        3b71697e5762f748275c7860e7261a4b

                                                        SHA1

                                                        79185635e1c42bc11105441d77d4091521661c80

                                                        SHA256

                                                        0e8c192f1fc4e30044236fed6399a8634a10f878fd374838a0cd144197e611c5

                                                        SHA512

                                                        bd624ef212652a845400fb51ab5277aa139185b5b16233525571fcfceb6c725fd7fa4c254f8fcaa80d61290ffb1111f30d454c0b0a7a79248a257d026f7f7c52

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qzr7kws6.default-release\cache2\entries\F4EFE37A30D0F14C6AC03FF7949A51CBC2EBC649

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        1cd0ae3050283e5c4f31e849180c1b7e

                                                        SHA1

                                                        14017121a27305bad94c162dfb3f70a917cdf74a

                                                        SHA256

                                                        d692818d207dace89a85ecc30c2d9498f9d8244b7bf6459f39303c2fedfe9878

                                                        SHA512

                                                        6a8501f4841c266da8f225afc7755c7e660a77f3940347c3b4394911ec11f65bc52481362d34755de7076cedfe9388974e1ba0010fdbc10bc3c5df56aa4cc81c

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qzr7kws6.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        a2bbbc593e85d49adbd6cc14cab22930

                                                        SHA1

                                                        be669693dbd958e452c772b42ff4e130a5111013

                                                        SHA256

                                                        54410302d837a5bbdc0e7f93d24a9739c30d6c548e5fe620de7a72c9bb0b579d

                                                        SHA512

                                                        9becd14135312e755af0302519aced5ae549867de20e494e5a3f05eb3aea7a6683ff84bc6fc547f4e7a4309c8e20175dd69cd7f5be8dd282883eccad444d4d95

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        442KB

                                                        MD5

                                                        85430baed3398695717b0263807cf97c

                                                        SHA1

                                                        fffbee923cea216f50fce5d54219a188a5100f41

                                                        SHA256

                                                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                        SHA512

                                                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                        Filesize

                                                        8.0MB

                                                        MD5

                                                        a01c5ecd6108350ae23d2cddf0e77c17

                                                        SHA1

                                                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                        SHA256

                                                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                        SHA512

                                                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                      • C:\Users\Admin\AppData\Roaming\IDM\idmfc.dat

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        c7d10a7918d11626fb6c317b581ed710

                                                        SHA1

                                                        44093be676fcc8f2bb22c0307a714fef8fdbcc90

                                                        SHA256

                                                        63474fcb3d23202a24c74ac8db3b796d60df16db0244f2e03e7fded58bd32c11

                                                        SHA512

                                                        4707c58f44dea8bd093299bc2eebc049f51f0eb9e545f323ae1f667edb8b10f71f761d4fe050dd382fd6e9e09a0ae9aa370a2aed2c4ec586639fecb18235abf0

                                                      • C:\Users\Admin\AppData\Roaming\IDM\urlexclist.dat

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        aee43ab150a20fcbacae2088984f2b0e

                                                        SHA1

                                                        4bc10452ecc2fb8a3f298696d8ba34b39476368e

                                                        SHA256

                                                        49cc9662b3c44f3eefe6a6fa967ca34e0da9606d451a6c408ee295ccef01e852

                                                        SHA512

                                                        39f585b985db1a708bec52c37a6a17055939622e4e577f4394a31d94e875cd1c04a4af69bee00568c1a0d392a889a0a7dd7b5608c03c6d350f0ca4c84650b32b

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                        Filesize

                                                        997KB

                                                        MD5

                                                        fe3355639648c417e8307c6d051e3e37

                                                        SHA1

                                                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                        SHA256

                                                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                        SHA512

                                                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                        Filesize

                                                        116B

                                                        MD5

                                                        3d33cdc0b3d281e67dd52e14435dd04f

                                                        SHA1

                                                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                        SHA256

                                                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                        SHA512

                                                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                        Filesize

                                                        479B

                                                        MD5

                                                        49ddb419d96dceb9069018535fb2e2fc

                                                        SHA1

                                                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                        SHA256

                                                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                        SHA512

                                                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                        Filesize

                                                        372B

                                                        MD5

                                                        8be33af717bb1b67fbd61c3f4b807e9e

                                                        SHA1

                                                        7cf17656d174d951957ff36810e874a134dd49e0

                                                        SHA256

                                                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                        SHA512

                                                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                        Filesize

                                                        11.8MB

                                                        MD5

                                                        33bf7b0439480effb9fb212efce87b13

                                                        SHA1

                                                        cee50f2745edc6dc291887b6075ca64d716f495a

                                                        SHA256

                                                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                        SHA512

                                                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        688bed3676d2104e7f17ae1cd2c59404

                                                        SHA1

                                                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                        SHA256

                                                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                        SHA512

                                                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        937326fead5fd401f6cca9118bd9ade9

                                                        SHA1

                                                        4526a57d4ae14ed29b37632c72aef3c408189d91

                                                        SHA256

                                                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                        SHA512

                                                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\prefs-1.js

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        932366a8441dce7d05e7ac2bd7f5585e

                                                        SHA1

                                                        2c611a93c0094d266c2c1f521f8f49562814bf03

                                                        SHA256

                                                        41def5f929117e955b333997497db9275af35323f48f32ac00aadafb2fbf0ffa

                                                        SHA512

                                                        58e7c2e11e6c3f81cf103235a86e01fb3ee7f3e4e50c9d31ecb0e682801b2125838f65a14acf726a4170747ac04936b204bc6476a90d78b7de115a5d3af85255

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\prefs-1.js

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        fb1de94563bed0d35a1c51cbcaf041fb

                                                        SHA1

                                                        c9ef660c787330328e42b308c3210a0a7bcc0534

                                                        SHA256

                                                        ab081225d508f5c4c44674b29b62aa17b601f1f437c56b74a2e35512492006df

                                                        SHA512

                                                        dc2d54cabdaa4dbadf209be1b7a44040ef317fd86a85cc9dc2e6ea33b0ee828b10b526ce105818086efc1d565ae637bbae05f42d0482480f535178f014a984e5

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\sessionstore-backups\recovery.jsonlz4

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        7da27897aa20eece832910a6aa7a1848

                                                        SHA1

                                                        dd16ce4f8e3b2afb2832903f8548e2a54f74727d

                                                        SHA256

                                                        00fa4e215e120c8a46bb53421749c48d7bcf61588729849a46ab75ec1beb312e

                                                        SHA512

                                                        20b434a49a1f144db37dd29fd93c52d82f4a2da02987c34afac3b0313b411b9540290846d42855d198238eb8ab927e74ec6ef5047780035d23712fd639d28777

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qzr7kws6.default-release\sessionstore-backups\recovery.jsonlz4

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        ee695ae64f48c60e30caf2ff7c6fa223

                                                        SHA1

                                                        1377f42f612b6d83355caeef247dd8162f26b567

                                                        SHA256

                                                        0b28de4397fae4e9c43a9f11eaea5b9a8b2293ad7898ec9173720560fe098754

                                                        SHA512

                                                        137280b18badacbcd9a51fd1174f92a4cef2f51cef53cad2897bf402ad86d55de2d38c82ea94263d1a969c78a55d0f98613451ece78c408be585a72bd97d99f5

                                                      • C:\Windows\System32\DriverStore\Temp\{dfbfff1b-efa3-8646-9500-5c752d3a002f}\SET55F1.tmp

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        d5e0819228c5c2fbee1130b39f5908f3

                                                        SHA1

                                                        ce83de8e675bfbca775a45030518c2cf6315e175

                                                        SHA256

                                                        52818c67be219bc3b05c58b40e51b99a65c2f4bcafe38a995610b4ec10928def

                                                        SHA512

                                                        bb397004f2256db781385de3e7e7b7993be8fbb2cb701ead99a7878c2bcca6c9ae4a7aa61c329aeeb6711c8c74081e971e85af38af6b32b58888c932fd51d218

                                                      • C:\Windows\System32\DriverStore\Temp\{dfbfff1b-efa3-8646-9500-5c752d3a002f}\SET55F2.tmp

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        f8f346d967dcb225c417c4cf3ab217a0

                                                        SHA1

                                                        daca3954f2a882f220b862993b0d5ddf0f207e34

                                                        SHA256

                                                        a54e0ac05254a464180e30f21a6b26651e7495427353bba9c246ba1d2388e7cc

                                                        SHA512

                                                        760c2914f3e937a2a3443a032cf74b68b6d24d082d0f50d65058a0fd87d8eeab229fb8d3105e442f0b3b0b2f3824439981951266425512e51e7ff36669a652fa

                                                      • C:\Windows\System32\DriverStore\Temp\{dfbfff1b-efa3-8646-9500-5c752d3a002f}\idmwfp64.sys

                                                        Filesize

                                                        169KB

                                                        MD5

                                                        7d55ad6b428320f191ed8529701ac2fa

                                                        SHA1

                                                        515c36115e6eba2699afbf196ae929f56dc8fe4c

                                                        SHA256

                                                        753a1386e7b37ee313db908183afe7238f1a2aec5e6c1e59e9c11d471b6aaa8d

                                                        SHA512

                                                        a260aae4ff4f064b10388d88bb0cb9ea547ed0bc02c88dc1770935207e0429471d8cd60fcc5f9ee51ecd34767bf7d44c75ea6fbe427c39cc4114aad25100f40d

                                                      • memory/3172-209-0x0000000000400000-0x000000000042B000-memory.dmp

                                                        Filesize

                                                        172KB

                                                      • memory/3172-33-0x0000000000400000-0x000000000042B000-memory.dmp

                                                        Filesize

                                                        172KB