Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/01/2025, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe
Resource
win10v2004-20241007-en
General
-
Target
de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe
-
Size
578KB
-
MD5
2e1c27be8ad0c7cd5d617f4e65386eb4
-
SHA1
fb52e06e294053458025c3b4fb5c828c0d69eede
-
SHA256
de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a
-
SHA512
35dac0d3a5db35798495c4ff64abe5b7e7b6486db82efe1cfb7898a86e11d2ae6d6f4c800cac2ec5289982f737357e932ab3f77f1ec7d28e2fc3bcd34f3e19f0
-
SSDEEP
6144:tKld3FcfCElJk125U8SpVUagDsvb6mgmw4sFfTysVufBn597NX2U:tkVcfXlJkE5YVUjuOjysgfBnnl2U
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x00060000000193a0-5.dat revengerat -
Executes dropped EXE 1 IoCs
pid Process 2772 ocs_v6z.exe -
Loads dropped DLL 2 IoCs
pid Process 2908 de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe 2908 de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2788 firefox.exe Token: SeDebugPrivilege 2788 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2788 firefox.exe 2788 firefox.exe 2788 firefox.exe 2788 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2788 firefox.exe 2788 firefox.exe 2788 firefox.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2908 de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe 2772 ocs_v6z.exe 2772 ocs_v6z.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2772 2908 de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe 30 PID 2908 wrote to memory of 2772 2908 de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe 30 PID 2908 wrote to memory of 2772 2908 de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe 30 PID 2908 wrote to memory of 2772 2908 de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe 30 PID 2772 wrote to memory of 2716 2772 ocs_v6z.exe 31 PID 2772 wrote to memory of 2716 2772 ocs_v6z.exe 31 PID 2772 wrote to memory of 2716 2772 ocs_v6z.exe 31 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2716 wrote to memory of 2788 2716 firefox.exe 32 PID 2788 wrote to memory of 1964 2788 firefox.exe 33 PID 2788 wrote to memory of 1964 2788 firefox.exe 33 PID 2788 wrote to memory of 1964 2788 firefox.exe 33 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 PID 2788 wrote to memory of 2352 2788 firefox.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe"C:\Users\Admin\AppData\Local\Temp\de857504d0af2fb85045bc4f68ed7df380e2490186af314ca2a27cd1b7d13a6a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v6z.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v6z.exe -install -555175 -dcude -6aa2c8fc392d4f159dd9827d875dc51d - -en -gkhbghprcxizxkdx2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://www.download-sponsor.de/exitdownload/thankyou.php?pid=dcude&cid=555175&appname=[APPNAME]&cbstate=&uid=59277f48-eec0-459e-b939-d4e4e0599abd&sid=6aa2c8fc392d4f159dd9827d875dc51d&scid=&source=en&language=en-US&cdata=utyp-31.userid-373538386166383338366565616338323336306438336639.ua-66697265666f782e6578653⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://www.download-sponsor.de/exitdownload/thankyou.php?pid=dcude&cid=555175&appname=[APPNAME]&cbstate=&uid=59277f48-eec0-459e-b939-d4e4e0599abd&sid=6aa2c8fc392d4f159dd9827d875dc51d&scid=&source=en&language=en-US&cdata=utyp-31.userid-373538386166383338366565616338323336306438336639.ua-66697265666f782e6578654⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.0.981426575\1543697907" -parentBuildID 20221007134813 -prefsHandle 1140 -prefMapHandle 1244 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {697731d7-4ef5-46c5-bd70-ffb5fff51d8f} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 1344 101d7a58 gpu5⤵PID:1964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.1.1190566324\256395848" -parentBuildID 20221007134813 -prefsHandle 1548 -prefMapHandle 1544 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b23769e-c48b-4728-9a3e-2a69cc7e5527} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 1560 ef40458 socket5⤵PID:2352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.2.1783320088\1808378423" -childID 1 -isForBrowser -prefsHandle 2196 -prefMapHandle 2020 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8dcc1a75-da84-4457-980f-f8730e6d1cde} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 2204 19e96258 tab5⤵PID:2384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.3.1938872649\1906134672" -childID 2 -isForBrowser -prefsHandle 2740 -prefMapHandle 2736 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e285d7e-fd2e-45fd-9fb2-ed8c58a8a284} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 2752 1c3b9358 tab5⤵PID:960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.4.1906145690\1016104493" -childID 3 -isForBrowser -prefsHandle 3872 -prefMapHandle 3868 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9d105e8-4fbe-43fa-9cd9-72fb5fedf3aa} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 3884 1d660d58 tab5⤵PID:3040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.5.581251240\397003499" -childID 4 -isForBrowser -prefsHandle 3988 -prefMapHandle 3992 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {35fcf1ef-89ad-4d22-b25d-cbec1742a6ad} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 3980 20d95558 tab5⤵PID:568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.6.848046602\1033417441" -childID 5 -isForBrowser -prefsHandle 4184 -prefMapHandle 4188 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0fba64a-3ede-4732-bb36-1a131b92045d} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 4172 20d95858 tab5⤵PID:2260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2788.7.588050392\1999559736" -childID 6 -isForBrowser -prefsHandle 2132 -prefMapHandle 3020 -prefsLen 27487 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a908112-cad6-4eb5-b245-56071b5149ba} 2788 "\\.\pipe\gecko-crash-server-pipe.2788" 2136 d5b258 tab5⤵PID:880
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize35KB
MD59df9b5fdc03d8d70361f08272b0fd40f
SHA14238317e91a32b52c4900b1775c73286199e2809
SHA2567ab34f6aec4134f533153fd5f14dd26173c00a2a5f133cd52bbd6d8c25b998f6
SHA512b974a7cb6950f51b355a84f5e8f49d06035c6f2a632a04aaeaf2cb9fa4d72525570bdd2f23915fb0236981c5fea2f08f086f475f1a43fc91b0e99bd4cb9db243
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
91B
MD5404a7679c5a70c38de354f87d537ca39
SHA15d33433a70b49f03a6fc448b778bbf7be41187b5
SHA25696950de153a245f1aead7e2edcdc266236d7f0a6b5d0be4703565cef45f1f7df
SHA5123502307cdc103755dab5dfc3f124e67323bde3b28bed6ca177eb8344030ace304329337a959eb4ada96d43a0482a7be7a99a0bb8aef322e0516c29e08d32aa0e
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD51c8fa5dd1b4f5a874e2557b34ba280e2
SHA1b55e8041194f9870751caeed037dbfb2f6a686cd
SHA2568e9f9a538affbb9c4c0b231b04f1dc1b1501fb149e95af2b8be10e40c812bf6c
SHA5123b7409d1996a7ef5b472d01a45d6891a4d1fbb89f1f6cdd063521ebde177d5806a40547bc16d8fb721c9d252bd03e4e42fc637fcbc6f85446a199350e70ebcfa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\5f0ea84f-3648-48e6-b4f0-4c340b4f964f
Filesize745B
MD57632053d0ba6f57e1898f28db23dfaf4
SHA1759aab5ebefa87304554221427543c84f30da371
SHA25684b4b9b92feb33f001379a40873e33a21274470008c0dbf848011242542ad97e
SHA5123a649543cc91be859aa6f19f688b03f63573b472ae599bdbce7d84333bc49602d1a64b4a2c555991f6649e4bc62e960919a93f272c27475402fc28af645a39bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\6cccf48e-e66b-48c2-8e78-dffa0a94916b
Filesize11KB
MD5ddad4ce966b532d64a8aa304b0ed85b6
SHA1762ebac35a53c14d20ae63585f43158746e953b1
SHA256aab36b96e60397a5e27eeb28c67f1621071aaa5cda4f141d289accd3cc4e15f9
SHA5120f739d5dc35853227abecf1049e6ea77a9a7c24f1803c36fef18e96029c7f58cb759f4ca2b60101809e4750c866600de738c7ad3ac878fc7d870a066e4dba3a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5717b268afeadca21878d5c61eacb3b53
SHA13e823beb93eda47a7ec424ca444d89bae46a44ef
SHA256bc8c2c2a50acea45d367b7128e0aebe0befeb1546af25ee4609b608a76f5dedc
SHA512bb8eea2eaf5cb4f1be24a3f029ed918429ec61dba2ea53760526dacf5d58d1d74345704d6bbf125e32061015a9dee13beb5caa161900ecbc357c5527e5fbbb89
-
Filesize
7KB
MD5864000954eb7c240e9b29f2c389d837f
SHA102e3b51f1f36e95c76d3e136fceb4872820e1232
SHA2562d94c5ce26e0b4259875db43ad31b0de9f56972007fe72eca340968eab76ade9
SHA512598e0bc91cb97d051e5f9070d0a0ce39aacee65505b1ed782c07341201d8c12af8ffd2b6069e89607e57eca6543e765d5f7705a23205e2f323c211ba33fde8f0
-
Filesize
6KB
MD5f1d8a415f73b4b12697f95913258681f
SHA18a11b1c349d90029cbac48e777f9415cdb2f086b
SHA256ce51f19bd076e056f42bafc2832bbf46103f72f2578d607a3775882a1cb73117
SHA5120359453faf500594f80fee34187c6e48004bfc9538f25b99ad32dcb6a1f2788aaa2a040a79c85f59b0d78878e533d2de68473342b614d86e10af915a1bca8768
-
Filesize
6KB
MD56868b784baed343d39dce874da147bf0
SHA1153309ff1c8f8730213b50e770754b9f625c3d73
SHA256885c164fadd152e24f589d0524458da67f61c95c0e77939113aa2170361afcaf
SHA5126bc03fb12aaf22bc38bdba9580f337355ad2b0adec396fc282364372a98a22c9c4a1033bc3d2ee44f574dffffdb122b5dffcc84e3d7c3a6c103615496502f6ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5879516281a1f3d7003c0b01ba0af18ba
SHA1a8594321a930a08c3c200f5b1d84d766dbd7048a
SHA2566552e45a1f40018f2a063cd02aa47dda4f5b296408b4d35adccbdfba0edd3d0d
SHA512db6576617d484ee922e345f80eb17a6c09280a519dade46910c822723e1f590ce3d5256f82c87daec5b16a9891c69d9d3ba12fb31599215a7dd382754731611b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD52e58b52d24915b7f06c4f54f8f0e37fb
SHA1102085b57406c1e5cc89da99b125e366b6497f87
SHA2565d99ca658a56a706609f74e5dfa26b63e9610c4f67edff70672735812c866c55
SHA512f9450e5c9ea8a544b05c49b577c3866a93b8b6d47e58878643ddda91bdab66122a52a431465fbfea1dfe3c0c9a8b8cc3aa94e522c01768d3eb5c681ff681a037
-
Filesize
312KB
MD509f02c017e40a998537f26d0caee8d22
SHA17676d2f17068a9050bbbbe10908e75bc5d59b631
SHA256fae6c9cfda16a9f4587b0041156a7284bf7cb1fc48e1e34f33b50ebc2d00e2d7
SHA5120c7d4fad92bb7478e277f6c56e0e0dbd665171a7bea06a6668d9d0120c5f171cbcec37c60b6354a286192f2f0bbf104ccc5550159e863ee03cc2e23243eb93c7