Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 16:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe
-
Size
604KB
-
MD5
6df0ecc5cec9ab536e7ca5c5e0670cd0
-
SHA1
e936d8ad2a84605dec3274fd3ef16c98f2882a9d
-
SHA256
1da358ed457821cee339e16bf4ca809d938d7822b53147a46445ec3e336d73dd
-
SHA512
9cadf4d6f978175f42874ee400254a076677f185fa6b54082280096bcd1ff69d62ef5109122ce4f08135bca36632da97ff1e802056ef0512a53805dff34b64f7
-
SSDEEP
12288:L7lw1DxCp0YUfX9F59l3N8aF7ysgfBnnl2JK:L7m1DjFDl3maF7ysgpnncU
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x00070000000170f8-5.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2252 ocs_v7d.exe -
Loads dropped DLL 2 IoCs
pid Process 2124 JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe 2124 JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2168 firefox.exe Token: SeDebugPrivilege 2168 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2168 firefox.exe 2168 firefox.exe 2168 firefox.exe 2168 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2168 firefox.exe 2168 firefox.exe 2168 firefox.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2124 JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe 2252 ocs_v7d.exe 2252 ocs_v7d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2252 2124 JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe 30 PID 2124 wrote to memory of 2252 2124 JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe 30 PID 2124 wrote to memory of 2252 2124 JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe 30 PID 2124 wrote to memory of 2252 2124 JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe 30 PID 2252 wrote to memory of 2156 2252 ocs_v7d.exe 31 PID 2252 wrote to memory of 2156 2252 ocs_v7d.exe 31 PID 2252 wrote to memory of 2156 2252 ocs_v7d.exe 31 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2156 wrote to memory of 2168 2156 firefox.exe 32 PID 2168 wrote to memory of 2720 2168 firefox.exe 33 PID 2168 wrote to memory of 2720 2168 firefox.exe 33 PID 2168 wrote to memory of 2720 2168 firefox.exe 33 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 PID 2168 wrote to memory of 940 2168 firefox.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6df0ecc5cec9ab536e7ca5c5e0670cd0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7d.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v7d.exe -install -3062240 -dcu -8db60d2eefd841818f5a2955d369a5bd - -hu -oufbtbhjnzdkeypi -3937262⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://www.download-sponsor.de/exitdownload/thankyou.php?pid=dcu&cid=3062240&appname=[APPNAME]&cbstate=&uid=613c636e-2e6c-43f3-bc23-4284a3e735a3&sid=8db60d2eefd841818f5a2955d369a5bd&scid=&source=hu&language=en-cl&cdata=utyp-31.userid-333732323333393431306239383531393866393238333735.ua-66697265666f782e6578653⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://www.download-sponsor.de/exitdownload/thankyou.php?pid=dcu&cid=3062240&appname=[APPNAME]&cbstate=&uid=613c636e-2e6c-43f3-bc23-4284a3e735a3&sid=8db60d2eefd841818f5a2955d369a5bd&scid=&source=hu&language=en-cl&cdata=utyp-31.userid-333732323333393431306239383531393866393238333735.ua-66697265666f782e6578654⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.0.2119484464\809237534" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1192 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d716bf03-edb1-485e-8c64-f136cc0da5de} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 1284 10de6958 gpu5⤵PID:2720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.1.130875467\464019430" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9333e1a-4896-4d91-97e2-2f187db30f5c} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 1500 400de58 socket5⤵PID:940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.2.1712004713\2016728556" -childID 1 -isForBrowser -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8364bd34-5182-4ae3-be8f-3c3cbd02762b} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 2104 1a3c9558 tab5⤵PID:1872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.3.200262754\1032280798" -childID 2 -isForBrowser -prefsHandle 2808 -prefMapHandle 2804 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71e8d891-1b5c-4938-8c6b-50a60808bc22} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 2820 1ba64058 tab5⤵PID:2216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.4.1079242862\1545635863" -childID 3 -isForBrowser -prefsHandle 3784 -prefMapHandle 3780 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe85cd0a-5fc1-46b1-bc65-29f372edd630} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 3796 1ea7aa58 tab5⤵PID:1592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.5.835913869\491963925" -childID 4 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf6fba90-53fa-48f5-b328-ae1a265cde39} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 3892 1ea7bc58 tab5⤵PID:3000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.6.478011364\523145883" -childID 5 -isForBrowser -prefsHandle 4020 -prefMapHandle 4028 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7fcb6260-b18a-4806-a174-1ba752a70f75} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 4008 1ea7a458 tab5⤵PID:2868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2168.7.1742343062\570994117" -childID 6 -isForBrowser -prefsHandle 1776 -prefMapHandle 1668 -prefsLen 27487 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e506ea6a-b587-4ccd-920f-e546b2b21b31} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" 1688 1ba65858 tab5⤵PID:908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD555ef33aad89b391afcdbc11374977635
SHA17c8731b3d159e17e24a8eb4d7de25ebc29ca2bd4
SHA25624187386a52a05df8a1fb42d93e3532b1c89371f69c2777cb219be6112731965
SHA512e1c60673013e5c3284035654496d05623cfbfa412a581f49b30b96b69415e71bccb5e6d3e1e835976580f262929d4ea6a9e2115716c062277b3a1d5c3d15d0f5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
91B
MD5d5168a5e3a4d744e02302879bbe2cb20
SHA1127e74df41b164e98d026899577d4add5f03a6f6
SHA256b427aa39d43395081527785cf8501ed58037e5fd48961ef4c2deec71026705e4
SHA5120f9e306b13b152b72596eeac5b793309e43279a87249bc25c83458fd69dfe128014827cee541d78382d00c42d39ccde68d6e40ebd5e4a06ce3d6a2f7aaf3ef6f
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD595138a057e60509da96349558b3bfa56
SHA1571d4a4a71ec33cbbd02c1eb63d75ada71078ee2
SHA256d0009a56564da26c0d68a22f76454c2fe97b1459b3614f818c2c5bb22acd9a4d
SHA5127ff1388d5fccd32f2cb288e677ea6112eb914e827d366c5d2f885de8bc30c94608e95078238f2c1ad80e4953280165e311be56a28ac4a4947bd40c7c43b74b9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5809ad503cd7a76a85c06fa437d686c54
SHA1758992fc2f0e415da55665f06f99a0e14930d216
SHA2567c0e8d414c17d966c2731feaec57ba6122701c9b820e78013dda68632e0cdd4a
SHA512e1ee139fa06df108df84e13fe7437ac04463ffff10cf9623b7ff4a4bae8769d48dcba238d59feabec369e531526071f4f530dbebe18a5b310d593b50551d9beb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\2f713222-03bc-40e7-a2bc-84df535957b4
Filesize13KB
MD57df363bc778273aca0c231a774b5699c
SHA1745756a06b421382e5eaab464a6f70d77a4c35c9
SHA2562beb4db36176e6346b15098761fb3c5611976fa335825708374c4a6365e7678d
SHA512e659692e776f0bb963c7fcf35d98441e0703f21bc90f2a6f150bf3b3fad75ad181ff684e6f68f1dc979d71fae912e11fb042374ccdc7112b59e0b4f9e89ecba0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\fb97bffc-de13-44d4-8025-fe85d827a9f2
Filesize745B
MD576ee3f8c5dab8cac1889bedcc39a6708
SHA1e749bfb1f47468c6a2498edfa80b7e3a0489e73b
SHA256d9a5ad398a0c28a05784ca42c95eebb54785e3babdbf44fe92580fbc16cfe3ea
SHA512d90a7ffe45c0d09180bfcf718dad792802edb4bf598e607651cbea74c108a851fc5544a1b6cf0bb9298b605e1aa8071f38748046a6ed3796d752a3eb45985c46
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5758afc5a46d2c8519bb7b3ef6010ff4d
SHA11c882a9d88b6beea889556874ec21ab6d594a800
SHA256973b4e2cadc16e15a6ae8cde002027096038101bab1f020cc90eedc0cd27c751
SHA512bbb583b6292bf267023b7748cfc7dfdf43caa1f80df78bff8f4270ddc973826a021ce9c596df788b95757f5650fa4d0b9511affb9d102f0bc062648152721346
-
Filesize
6KB
MD5edba0143b62ea876bd7160d9ba403e0e
SHA15062701dab5b8a385b6b088235487ed66e734ac2
SHA256788e8085e3270fe8ef421a16c7631710d2d7b85b9db92ef734212ab8c59df509
SHA51231c601a747a4fc56ff5092110259a47eb8047c6a355a0523e5993254a3079cf4f8f36282499e8e5708bfb057baefa624895872aab9597f9e5512872ac9ad6975
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD59356b165e14935fdd206ff2458d2e27b
SHA1c84e7edddcab41820841c725bb81e6c8f1c7401d
SHA2566c85657234589a91d309c1e18dc7897093212ff2bce6129529d34cc7ce35407f
SHA512186a2e1c5354ec9bad5132d09041d58b010d14819cc74982fdfd48411eaea1b292dd9b7d5c82bb825633edfd5adfa84e795d070afc4257489f044b556af2b060
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD57d82a7d614125ecac2638f733d2d7fb0
SHA18e040c3665e705990537d2a644d35b12423b84df
SHA256570f837421914844aa34832e0ae51531fff74c66a597457930b64a0f2e27ef9e
SHA5128d45f519a1b4314c42940855063afa22efd3c85a20f4317d2ee38f8796fa358857be700a4d7ca0dfa44e86526dffc8203940802ce0fbc4dd73c46a8912985c58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize2KB
MD5953c4ff3d8825e80048b96ec5e9e14ac
SHA11287cdc1113daae25d6911f027f416b2e09e2675
SHA256599b34de4de1b9dc55c2f62c8544d4b4e770ae1c4734bc8567f55be4d3041312
SHA51221dd03e6765eb956ea844f8bd2f5be187f25233508febdee59e6da11cc0db004bd455cc904bd256c3be4a49b7516466f866df3502ea9057bb82c8f846cf33d17
-
Filesize
292KB
MD50f152d15cd6845999b6fe329e87ca52b
SHA134bcde11a22683ec42f88cf11a55df978a1ca53b
SHA2566b0c155bd3f1129d78dc8e076841211963d05f0ec41db5fbbe28199531f611b2
SHA512966f9388dfc106b1e2aed752ec3b2003ed9dc3371098a349232e9aaa47e7e1a58cbba3a85d95334511ebfebe3a14a4429bb354106de72a592c1b8462ca005a5a