Resubmissions
07-08-2024 18:16
240807-wwjlqs1hjm 1007-08-2024 18:14
240807-wvf48a1grn 1028-05-2024 08:02
240528-jxc45abh5s 10Analysis
-
max time kernel
65s -
max time network
55s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-08-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
Resource
win11-20240802-en
General
-
Target
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
-
Size
166KB
-
MD5
7c421ca94c441a4b74d364f952f8739c
-
SHA1
e5de78ae8db1aa78e00c1fa1eb5687cd1519843c
-
SHA256
7afc7a311740da58cb0b7d6c43e28b1ddb6fce9c67614e74902e552b330287b0
-
SHA512
0eb45486ab306562c267eba5eae7f1b8d6d551b83603d136865c2e1c7c90abb0067effc4a358649846dc89ef37ad9ff266922223f318a631d3f457792f1df4d2
-
SSDEEP
3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QDhqtUczTajkz+XHUU:NJ0BXScFyfC3Hd4ygV6oPHU
Malware Config
Extracted
C:\Users\nn1hpz4i-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E566B346953727E2
http://decryptor.cc/E566B346953727E2
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\U: rundll32.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification \??\c:\program files\PushLimit.avi rundll32.exe File opened for modification \??\c:\program files\RequestInitialize.ogg rundll32.exe File opened for modification \??\c:\program files\DisconnectImport.mpeg2 rundll32.exe File opened for modification \??\c:\program files\MergeCompress.bmp rundll32.exe File opened for modification \??\c:\program files\OpenConvert.xlsb rundll32.exe File opened for modification \??\c:\program files\CompleteTrace.docm rundll32.exe File opened for modification \??\c:\program files\SearchResume.asx rundll32.exe File opened for modification \??\c:\program files\UnblockConvert.mht rundll32.exe File opened for modification \??\c:\program files\PopInvoke.aif rundll32.exe File opened for modification \??\c:\program files\DisableUnpublish.vssx rundll32.exe File opened for modification \??\c:\program files\GroupEnable.m4a rundll32.exe File opened for modification \??\c:\program files\OpenSelect.xltm rundll32.exe File opened for modification \??\c:\program files\StartShow.mpeg3 rundll32.exe File opened for modification \??\c:\program files\StepSubmit.wmv rundll32.exe File created \??\c:\program files\nn1hpz4i-readme.txt rundll32.exe File opened for modification \??\c:\program files\ResumeRedo.vsdx rundll32.exe File opened for modification \??\c:\program files\SelectInstall.mpeg rundll32.exe File opened for modification \??\c:\program files\ReadStop.cr2 rundll32.exe File opened for modification \??\c:\program files\ResetWatch.html rundll32.exe File created \??\c:\program files (x86)\nn1hpz4i-readme.txt rundll32.exe File opened for modification \??\c:\program files\EnableWrite.snd rundll32.exe File opened for modification \??\c:\program files\ExitExport.xml rundll32.exe File opened for modification \??\c:\program files\SaveUpdate.eps rundll32.exe File opened for modification \??\c:\program files\UnprotectUnpublish.ppt rundll32.exe File opened for modification \??\c:\program files\MeasureUndo.emf rundll32.exe File opened for modification \??\c:\program files\OpenSelect.dwfx rundll32.exe File opened for modification \??\c:\program files\ProtectOptimize.svgz rundll32.exe File opened for modification \??\c:\program files\RepairRequest.wmf rundll32.exe File opened for modification \??\c:\program files\ResetReceive.001 rundll32.exe File opened for modification \??\c:\program files\SendConfirm.rm rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1764 rundll32.exe 1764 rundll32.exe 2884 powershell.exe 2884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1764 rundll32.exe Token: SeDebugPrivilege 2884 powershell.exe Token: SeBackupPrivilege 1496 vssvc.exe Token: SeRestorePrivilege 1496 vssvc.exe Token: SeAuditPrivilege 1496 vssvc.exe Token: SeDebugPrivilege 5444 firefox.exe Token: SeDebugPrivilege 5444 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe 5444 firefox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5444 firefox.exe 1512 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1764 1320 rundll32.exe 79 PID 1320 wrote to memory of 1764 1320 rundll32.exe 79 PID 1320 wrote to memory of 1764 1320 rundll32.exe 79 PID 1764 wrote to memory of 2884 1764 rundll32.exe 80 PID 1764 wrote to memory of 2884 1764 rundll32.exe 80 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5356 wrote to memory of 5444 5356 firefox.exe 90 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5608 5444 firefox.exe 91 PID 5444 wrote to memory of 5668 5444 firefox.exe 92 PID 5444 wrote to memory of 5668 5444 firefox.exe 92 PID 5444 wrote to memory of 5668 5444 firefox.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3228
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5356 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5444 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1932 -parentBuildID 20240401114208 -prefsHandle 1844 -prefMapHandle 1848 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd905745-5462-4c63-8e8b-75631c9afcc7} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" gpu3⤵PID:5608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2332 -parentBuildID 20240401114208 -prefsHandle 2324 -prefMapHandle 2320 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89017deb-7331-4699-83d3-9d5be2ecbf88} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" socket3⤵
- Checks processor information in registry
PID:5668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3208 -childID 1 -isForBrowser -prefsHandle 3228 -prefMapHandle 3288 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec0fb333-de96-43d7-a5e8-596653194aab} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" tab3⤵PID:6016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3532 -childID 2 -isForBrowser -prefsHandle 3524 -prefMapHandle 3520 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {067155e7-3f24-482b-8f09-1fd77e90b8e9} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" tab3⤵PID:4080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1608 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4524 -prefMapHandle 4520 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac0f1fa4-e7e1-44e6-8bb8-cfacaf61591d} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" utility3⤵
- Checks processor information in registry
PID:2760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5336 -childID 3 -isForBrowser -prefsHandle 5332 -prefMapHandle 5324 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f70032d4-818d-4ada-8208-0daa9b1e8729} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" tab3⤵PID:2084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5204 -childID 4 -isForBrowser -prefsHandle 5480 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e9541fd-05e5-4e06-881a-a68a4e6ff831} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" tab3⤵PID:2184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 5 -isForBrowser -prefsHandle 5660 -prefMapHandle 5664 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b2f3790-14fe-4c98-a9b0-e6e4542b8f47} 5444 "\\.\pipe\gecko-crash-server-pipe.5444" tab3⤵PID:2016
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6o52671h.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD57374a48dbb22600ec8cd353e084507a0
SHA13198c6161fb70c2a3537a0acbd8733605d2d0202
SHA256d2afd515e652b91b31b02822e229e003fad3b67883b1801c781999cd6b1e976d
SHA51244ba623ee286e954e4f3f7508caad791b22db7ed2c4ee607704a901a687e542b60b2bb998cf6858d3966bacd3c5b52709531d2fceac16647abba8270c4728e30
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6o52671h.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD573e65616500f4457bfd4ee4455218388
SHA1978b6a52229a8abcdd605f717634bd6a038f4e54
SHA2566d58e8b644b2260c8c2383200cd97736a1ef8060faffd13f9997a0c68a1e8723
SHA512886e1ec8069c5be21587576e4e1c932b64f5e2cad92675b96063b4977ed8ddc1ba4d837f4470d5ee04d81ffc4c30efdc068f556bd169362543f267c041b0b1cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6o52671h.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55d42ccf647e1bff6b6e41db9f220af7e
SHA1ef16fcf617498dad6d68f310783b135d1da4a848
SHA2563e8aa594b1d47743ee5075b5cf5490aa83477384366e18ff7ae6bd674fb94d56
SHA512dc0a9cfbad5e7cd6a1977a5cfa6724301eaa451670bb3a597671cc628bdbb713560dd222359a3f52e9a3200e4496f64113bfd625b07c26b2b81598a0d297b088
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6o52671h.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5612a3adff39efa0c42f4309ab8f7ebd2
SHA1e47ef6c1e0566e0d80a8bb45d6b7b44e24daabbb
SHA25695760adcb7828fd597e5f8dcb676381957efc3225b9cb25c169d200b762ef620
SHA512d21f3db84665e436257abf0fa897d22c4d016e022fd3493b3aef573bd53457af4ae21067d9f0e9961cf9297bcfb05f610a4c2e597da457165f0967a7630c53f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6o52671h.default-release\datareporting\glean\pending_pings\0230ff37-3fa4-4a58-b171-f28ca9891827
Filesize671B
MD5933694e1562e043eb43896c434a331c4
SHA13b35db7be2a0c3462384487b092650f7b1c7bf0c
SHA25688c0019c871f3c6a2a3dab687d41b7370d71ad64c294ad303a2fb88ff26e77a5
SHA5121b4976c6200a943600b9c33c5d8d1f9313feaf9b9051ae565902824484691ecfc3300b87a706b97b983f5e10d003d18eea50cebc0aff165155ae4c04ee1a6ee9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6o52671h.default-release\datareporting\glean\pending_pings\278a99b4-ab5f-4541-8f1b-11a26fb3fa28
Filesize982B
MD5e15510b24ef504e7ebffa8ce71f7154a
SHA14fe7ea3b480205abadc88dcfe87706af69141a10
SHA2561ce668148f79e32bfa4a6ad99284614b1c7569a398e6b79c225afcab3e762dac
SHA512f19000d09dc0d356fd99e9a95ed7283893136164b4b0fdf19aae79d20b3c5d8727dc4eeaa60fe384b1d3f366d7a91daeb8a21338903ac599abf4d2e6acf4b68b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6o52671h.default-release\datareporting\glean\pending_pings\98b6cb31-ea92-4549-8ed0-c42273933347
Filesize26KB
MD5ad43e8070e0ed10ae7afaf48ddfbb9da
SHA14c304159035a6b6a57ac06e89b87cfcfbf09a090
SHA2560c3c61eb9743073e915de038d23bec40e5c03235377148327e76b177b1daca87
SHA51290eadb7c69ef8a7544c4fe8ff052985a3fd260f78f895858235481c836799e796f02d952643fcc7984db43786b3b506a005f8a92bd1fd752910cb643a7f186f9
-
Filesize
10KB
MD5e425cd3b32425ace57d00646ba733fb5
SHA1268db713d4db7890eddad923a3573ffcbec2ee92
SHA256e08663dbe9d468007478749ea1b8f38b13835c6502f7b86c1f3ffa636b4cd295
SHA5121a898ace31fd80accd3524a9f0f7dae9c28f13b7f3b5723f9c54303f24f5dd8423315abe12cb0be7e8be604be09e8634e24cd45d7931dd62ca3e8db7fd5b69e7
-
Filesize
6KB
MD5ccb8798c52f41e8085567e5b2de2acfb
SHA130ac2b595a752f79c183ea3e4b99c70d1d30684f
SHA256d2017fc22455424f395e4a142fd0673212d6433a8161ae07ab70d6972eecf995
SHA5129dfa6f50971fbd157d6827903ea1eeb576542869e87038529cec865fc9dee619674ec1879edb4f9aa4b0eb50e83bf11e5469d516468e9b6b108b086a260004db