Analysis
-
max time kernel
99s -
max time network
103s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-01-2025 23:26
Static task
static1
General
-
Target
exlaunch2.html
-
Size
69KB
-
MD5
b4302098b433bcbe1ff0c827ee6c241c
-
SHA1
6f5f6ca9798e0ded6360e967cbdf70327508bba6
-
SHA256
91aee8007dbf9e763c1c0d52f7f07f9b831a4beb4a9f1b129fe48fcbf4f1200e
-
SHA512
1b47a143385cae8cc268f74059d39a9b42dfb1981bd2daff9ed34332f4de67a6431a2b9e608ca019033ca028c7db186eff0e5e9656c6f6cfbe46edd68682d217
-
SSDEEP
1536:O8zBPf8zBTdqjkbTM2Cx5SMEwEpXSM12EMAspEpnWFSQovq6fqPJ:bEqx5SMETXSMFMvEISQovGJ
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 2132 Exsetup[nvme]_v2.4.6.exe 6068 Exsetup[nvme]_v2.4.6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 77 sites.google.com 81 sites.google.com 72 sites.google.com 76 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exsetup[nvme]_v2.4.6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exsetup[nvme]_v2.4.6.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\ExLaunc#er.zip:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2132 Exsetup[nvme]_v2.4.6.exe 2132 Exsetup[nvme]_v2.4.6.exe 6068 Exsetup[nvme]_v2.4.6.exe 6068 Exsetup[nvme]_v2.4.6.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3652 firefox.exe Token: SeDebugPrivilege 3652 firefox.exe Token: SeDebugPrivilege 3652 firefox.exe Token: SeRestorePrivilege 5456 7zG.exe Token: 35 5456 7zG.exe Token: SeSecurityPrivilege 5456 7zG.exe Token: SeSecurityPrivilege 5456 7zG.exe Token: SeRestorePrivilege 5764 7zG.exe Token: 35 5764 7zG.exe Token: SeSecurityPrivilege 5764 7zG.exe Token: SeSecurityPrivilege 5764 7zG.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 5456 7zG.exe 5764 7zG.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe 3652 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 4660 wrote to memory of 3652 4660 firefox.exe 82 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 1124 3652 firefox.exe 83 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 PID 3652 wrote to memory of 4996 3652 firefox.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\exlaunch2.html"1⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\exlaunch2.html2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1716 -prefsLen 23839 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {561bedb0-fd11-419f-819f-efc7780e89c4} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" gpu3⤵PID:1124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2408 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2340 -prefsLen 24759 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {543c8f3e-0350-4d0f-8e0d-8921f8effdaf} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" socket3⤵PID:4996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3104 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3092 -prefsLen 24900 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cc9cad5-2222-48d2-897b-1d5dc8e44ffd} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" tab3⤵PID:5068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3620 -childID 2 -isForBrowser -prefsHandle 3572 -prefMapHandle 3568 -prefsLen 29249 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9a9c496-9d13-4972-9e7a-933f1773ef23} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" tab3⤵PID:4224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2744 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2756 -prefMapHandle 5100 -prefsLen 29249 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb8be760-76ef-45b2-8eff-a642019ecdd6} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" utility3⤵
- Checks processor information in registry
PID:4692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 3 -isForBrowser -prefsHandle 5604 -prefMapHandle 5600 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b6e1281-7d96-46ef-b42d-62220a2b9bae} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" tab3⤵PID:4232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3428 -childID 4 -isForBrowser -prefsHandle 3068 -prefMapHandle 3376 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d943f37-5cef-43c9-a010-eadd454f2e76} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" tab3⤵PID:2928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5900 -childID 5 -isForBrowser -prefsHandle 5980 -prefMapHandle 5912 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {970435d6-e3d9-40e4-aa30-da6456d754a4} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" tab3⤵PID:1572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6100 -childID 6 -isForBrowser -prefsHandle 6108 -prefMapHandle 5796 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca45ef59-f573-4344-aa88-bfe890c6a00b} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" tab3⤵PID:4032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2736 -childID 7 -isForBrowser -prefsHandle 3608 -prefMapHandle 6488 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddecc04b-f8ee-4858-9626-25eee996fb95} 3652 "\\.\pipe\gecko-crash-server-pipe.3652" tab3⤵PID:2896
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4516
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap21532:78:7zEvent41681⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5456
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap12377:78:7zEvent102211⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5764
-
C:\Users\Admin\Desktop\Exsetup[nvme]_v2.4.6.exe"C:\Users\Admin\Desktop\Exsetup[nvme]_v2.4.6.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
C:\Users\Admin\Desktop\Exsetup[nvme]_v2.4.6.exe"C:\Users\Admin\Desktop\Exsetup[nvme]_v2.4.6.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\AlternateServices.bin
Filesize10KB
MD50be267f28ad00734b8e201cfab6f0fce
SHA125bf429b91eab6e626e9a05b8b7b7368bea7fe9d
SHA25686ef519162ff3881a5548a9b6d3ffea1aa2b7d158e20a94bedf7baa81e229a91
SHA51262fdf348e014aa10b144caacd086faf188b3b0c06be95bbb0661988a04f5216fc3e52fa2a4d9e286505f4d8c0c7a83bf9056051a7ad12642297e621c3bd03bab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\AlternateServices.bin
Filesize13KB
MD502296c5ebca901837dcaa677319179e1
SHA1e3b9737c2e566971b1999caf71a9d32eadb5c8f1
SHA2565171c46a6fd4bb7f5a2086662621c286e6100e646a9fcab4b8ca3a79f31d9256
SHA5124f0a2e727f3eda4e7e882ab867e69304224a1d64da9980e5b11a435c2a2642b3050e09df19bc3456fc2092810c30b61a2e4b5f6f87f901c0b35182040e0bb877
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\AlternateServices.bin
Filesize35KB
MD5995186576a49bbe5f455a989d25bc01b
SHA14ee17cf091b16fa72a32fe297e8642931d53034e
SHA256bfa7ab3dede9541890e0090ec5476daaa7e11165007ecda6ef52dc25e31c8e34
SHA512d357cdbca9e7be15f6cedb9623793f2844b7e910471f8b823faba365d7f8bc0c8823de59f27c9bb62b50d14081cf627bfd1bca37bdd3337d54e1b6a42ec4b2cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD53935a377b28bd99aae158a89fa8ed73b
SHA146922dd84143e8a516aa7d2772f363b517e063b9
SHA25628d0fc726c757bfb114c5bcf447946e40c6f44e843615ec9687fb418f6179815
SHA512f87dea029f84fe673fd7fb7a8260d9887e452ff93dbd3988a52cb96c2abc2a888ed0b0680c83b010a2606e8aa7fda75507618c66a45340355655e4688e88b2f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5357c54371c6c17011f739306c954adb2
SHA15e2b336d36faeeb9460641341515e8f75e810778
SHA256cb738cccb8b578bef375bad3ab77d0e72c7cdaf8e55e03dc90f1a835acf596fa
SHA5126097212f680fd06d537f6ff6671001a2a6d15ab7ba8e884ff05f200c143bc810ca6372f3064270fbafa6a3636e440deabd1cb36ebabfedfe54c14fbcaddbf301
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD537688b696584ce732ac09b0c89dd1c4b
SHA160d466e21162f49c4832cba4937e7002a9ca45a8
SHA2567ed4406e730d5a6a5aafa9689c38a8d3272cc32aace0d0d6a624f4be89e1ebf4
SHA5120041fbde89e69ea73df5de4e7ea2be5d8c86d5c8e65433ecf556ba2f711bdad040bb675cbf65fb4e77cf14696ae05442214094320bd362de646aa296e124a814
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\datareporting\glean\pending_pings\9130f376-70c3-495c-ac67-1c1ebf067ac7
Filesize671B
MD5b1db37847bfbf2e0c99aaff2b68fddde
SHA13c72d535055420aff52ffc2d0ba6594c3669440e
SHA2560d1a161fc48c32c5704c883dfa481ecabffe92c57ef5d870eb207018dcb2808e
SHA512f90b70aa608c462e15a2aa04d5ed6e4bf65f946ea4450ff98000709840edc33369841cffa58941b893fff380ed0e4ea7edec8cc256f27ac6acd73612f8fd6b78
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\datareporting\glean\pending_pings\a36101c9-72eb-4f17-afff-f7214f149daf
Filesize982B
MD57a6526a38c0dfcd92dae42332a0fc95c
SHA1dd3b871a0f9ad7c4803caffe90c8cb837cfec188
SHA256698e7af47e0f4336777b5a2eb69e54b73e9fea8c0fd7734b2341b1cf707a18a3
SHA512aeb42816a3d521901986c2d03a9d46f656757c1c69c2c0bd9ae75859d5836b557f97ba8da4871f0d52d6d0c4d17f6ddb625a7a5a5d7ca8cc7ad21b84254f1480
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\datareporting\glean\pending_pings\b7e227e8-41a6-4677-a830-338dd75fd26b
Filesize26KB
MD56463af973f6a74c394e732811fbbc259
SHA16cc9ab4783940ec1860a1de22a539aaca2442aeb
SHA256a26fba619d346e4e75516a55a1956165635532c1e32979e7b4671f04c2ccf725
SHA5120f84309d158b377513611da74f5c0430a7cbb9b096dfe8ffa37b0620c571b32cbb8a1cfe7f86718756c8682c1d651bc381622d7d456526dfd8dfdf5ff4ec935e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5cc51c94a93319dc2295a56a2353d75d8
SHA1385dca7c7d5be382fb56724e74d7a50994f8d2e4
SHA2567b52f3cce91e3789523b85d80f07fdc41d30d3745dccd72a6095d827e1278479
SHA5126d7c8bfe3132f5511a53f57ca3c06cc27ed254207818b3ded140a3b3ec19acae875021171fbbbb8585946e6f1f35e4bfda537067a4a67f12f2ffadaa35dbaf4a
-
Filesize
11KB
MD5f4fa87055e0bbe5b6f76402edd7decfb
SHA1b12ddb20d2e7692a177d89f3ea997ff8ee1d4e70
SHA256ed1a8801ceeb5ecb516cf8730f35c4b24b41fa86d6721587137b1e6f1bd987f1
SHA512b7865dc856ed2997be471951c7c7ddbc833b86a5e7300eb812c4d414a4ff009eddf66432a9ded84a0ac4ed42e51ed3c914a23f4e42e19853cf92be258754b478
-
Filesize
10KB
MD54ad938eef8a37a1df62448643e99808d
SHA1fc43a3c34903d284aa0fe14a6c3d0832343865e4
SHA256e0e3bf5ebfe79811eafd046caf9ee991fa5b583a5e1bf87e45f1756028a48f36
SHA512659737f7d3b26051ceefc82fe73b129fd636d531b5f30153998b43846f35b4b6c5fb3bfcd7fb6b03657295d51460f79cb4c06104513a6d7cb7f722c5cd4d1a0b
-
Filesize
10KB
MD577f031ce8fffdaad4c9ba29fa2ad6deb
SHA16520ea14c8b14d5cfed28864427e9c100400a27b
SHA2566359b9344b79cb9357278458f24ec1bbcf4945f51ac2791c6ef6674ee81cbf65
SHA512a58f910348c8fb3258720ecf434252ff43d9e110dce0459eb9e57b0117e4d2e81a144ec2c0d6c71d08298ffed8fe2df5b1c8691b3d56bb5eaf786a4f82084692
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5a53760451db43f76712bb6a330e848da
SHA14097968f7cd6a2327e28eafa037a852b2e5a45f2
SHA256e3fe6049aa180e702845e32f8b077ddcbd750bb1ba893b9daf8c4238a1f77d59
SHA5128c217b58805f480737f4743e405f00b414917fbf6c5aea3ed3a4129cedd5570fea271e6adf0e321648778a4e0a5f2e8a4d1c10e308c74b3be5910c8c190b18a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wedc8dlt.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD557a90c410e0b3168dc97be1799b43f24
SHA1d2b9238f6b102a81aa020d29973dee60476f3cc5
SHA2560bb1f8a468f0814ccca40a220a7f5507b6e13af51ab8383403e5253775b1f300
SHA51268691be363cf710e2aa3f2e05bf9b496db82614a3a21ff4701eb12310bfdf62ad236937f775fa7676864ffbd3bdcb5ca7cb8463c777016f03ccecbeef669fdd5
-
Filesize
6.5MB
MD56d22bee4b739f886a8d46e9125c68a91
SHA145947e84ccb9e690afbf7af90cecf8246bb010b8
SHA25687891d9e5065e4f359bccd9d3429cf35712c30f7317aed8d1e83a2f9330f127b
SHA512c9d0b4993b152898a4d51846f2bea01a23855ec4b84c8ee1e11f360e5cde0259ac3a42173246f427b30f31ef941c74f6ffea32018ee83d4e907b711a0a71f6d5
-
Filesize
6.5MB
MD5ba8d557eef260049613d78de6277d779
SHA12b6e149bfbf9040d83752bd0037acaef2810533c
SHA25653287fd4dcd013a3c8e10b81adfc37bae39c7c56377f169c0d816fa4e74ffcc7
SHA512e00a74d1010396ccc40b8fa99c8d7b4432513e38bd5bae5fee5a661a4253b77be61e379f7106f98259455465573f2571a44c99fb0622a4fd8cee245c42b0c20d