Analysis
-
max time kernel
33s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-08-2024 18:23
Behavioral task
behavioral1
Sample
vbug-master/vbug-AIDE.apk
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
vbug-master/vbug-DS.apk
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
elite.apk
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
fbcr.apk
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
mobelejen.apk
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
vi4a.apk
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
vbug-master/vbug.py
Resource
win11-20240802-en
General
-
Target
vbug-master/vbug-AIDE.apk
-
Size
2.2MB
-
MD5
90c72d2c718ef0e16579befb4aa2b193
-
SHA1
befc0a75d30d2d3d20e9fb3643ac64ae587234da
-
SHA256
08d9dda676460b38cb84c66887d30e0da4e5b37803fb5bca136a0d5534fdc6c1
-
SHA512
20bd4bbaade22969c74f98a408fce4cc89d51b3ee59d4487a5f771d687f956a12e59a9ae15747bac29642d6995b1eed04a70b1c2989bf449a9de045be4d32062
-
SSDEEP
49152:57a8WgPMpjqIWWZoQwwLggP5glEvSyUQfUF53MdiAjRDN:wdgPYqk6zwLgug69U1TcdX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\߆Ȧ OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\߆Ȧ\ = "apk_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\apk_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\.apk OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\apk_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\.apk\ = "apk_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\apk_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\apk_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\apk_auto_file\shell\open\command\ = "\"C:\\Program Files\\Mozilla Firefox\\firefox.exe\" -osint -url \"%1\"" OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2424 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2528 firefox.exe Token: SeDebugPrivilege 2528 firefox.exe Token: SeDebugPrivilege 2528 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe 2528 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 4508 2424 OpenWith.exe 84 PID 2424 wrote to memory of 4508 2424 OpenWith.exe 84 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 4508 wrote to memory of 2528 4508 firefox.exe 87 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 3980 2528 firefox.exe 88 PID 2528 wrote to memory of 1460 2528 firefox.exe 89 PID 2528 wrote to memory of 1460 2528 firefox.exe 89 PID 2528 wrote to memory of 1460 2528 firefox.exe 89 PID 2528 wrote to memory of 1460 2528 firefox.exe 89 PID 2528 wrote to memory of 1460 2528 firefox.exe 89 PID 2528 wrote to memory of 1460 2528 firefox.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\vbug-master\vbug-AIDE.apk1⤵
- Modifies registry class
PID:4124
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\vbug-master\vbug-AIDE.apk"2⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\vbug-master\vbug-AIDE.apk3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1932 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54af5a02-210b-4def-89de-6f667b345198} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" gpu4⤵PID:3980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2344 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59dcf9e6-69ce-4e14-8b0a-5f3cbea463a4} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" socket4⤵PID:1460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3392 -childID 1 -isForBrowser -prefsHandle 3264 -prefMapHandle 3220 -prefsLen 24739 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29e21c8e-c9ac-4eb4-b065-6fc6d0c763b8} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" tab4⤵PID:2880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -childID 2 -isForBrowser -prefsHandle 3104 -prefMapHandle 3140 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1d0087e-dd0b-42de-ab3c-fab9f035c3bc} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" tab4⤵PID:4260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5196 -prefMapHandle 5192 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d41a5ca-1797-4b0c-a5b3-3fffd9532d3d} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" utility4⤵
- Checks processor information in registry
PID:1600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 3 -isForBrowser -prefsHandle 5428 -prefMapHandle 5076 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {275930ec-a962-402b-bb7e-a7fe5b1d97ae} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" tab4⤵PID:1760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a515120f-b737-44c2-8662-bbdac91a4954} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" tab4⤵PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5884 -childID 5 -isForBrowser -prefsHandle 5476 -prefMapHandle 5532 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9bdd5915-5f13-43a5-a8f9-05ae88a6c389} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" tab4⤵PID:3540
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\vbug-master\vbug-AIDE.apk"1⤵PID:3120
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\vbug-master\vbug-AIDE.apk2⤵
- Checks processor information in registry
PID:4476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\vbug-AIDE.apk"1⤵PID:4116
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\Downloads\vbug-AIDE.apk2⤵
- Checks processor information in registry
PID:404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\adahrqhl.default-release\activity-stream.discovery_stream.json
Filesize33KB
MD5452b516b2c3d025d7ad763d000dc7c65
SHA1e4ab0bd8fe12ccbaefc5d1158f7623d0a7619ce8
SHA2568789c63d77f54ce21833e48648fec3f3dd4b9dad392e27864036f4cc86920275
SHA5129bd111a616b9815fa73d79796e97d6d3ab870e461411c4ae5686a5dae370022016d0d87797aea11252a5de8682d81a6911629bb22b3fd1c31c549d50981a3441
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\adahrqhl.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD581e1b2f170673a0198ee3e736a73b1e0
SHA1421cf56babb67155d9fab7f12ba82da00c07ba43
SHA256b56f4493db7b09fac4cede43f08cb84e8efa9f8b770a4c2b8bc2ef8f3e0494a4
SHA512491dec024bddb6e7fc0827de142b5f29b65331a04218d133150c2707d5d4a2677ebedf9915209576a92ff1f78d18337a7c66fe1e488626056af56ce77122795c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\adahrqhl.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c8cb9a95bf10f0925ff1a23b71a02156
SHA1af3c483150368209cdeeb8472aa5afc5e51331bc
SHA2561137f9ace6186930a35b81468fd9f740a7ad4459098d86fe5c2e5c2cb2664ec6
SHA512073aed8206e028d08e32f4c176abea542abb402315448ba5e58ab5654f94c94d6f0111e8f268837f61f1aed46938b3d6e5f0d28fb6f5020191c2e050726365ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\adahrqhl.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59f70a43cc9a41b27ffaac0c6cc70ca39
SHA1006ea17f9c810a95b1cebb4d9c0a29394ca101fa
SHA256d0b556bb4f309eee18f634aa807ebdc62d2c7b7081920aca19f51d20d326aa77
SHA51203807de91e51447a5e3e0898605ad906e7957206d84099421944e8b8a3e67519ee357fb480da643b342dd74adcf6224def17705e998cf7e1120efa1df608afaa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\adahrqhl.default-release\datareporting\glean\pending_pings\65c7422c-12f3-465c-a0cd-b926d5008ccf
Filesize24KB
MD52091e712ba0bab4935d11a189147f219
SHA16dcd36b58d2a01389b527f957526365a3370c3c5
SHA2560821306ab6cb6956e92e1e725b82a8089f23bbaf234b06dc1e3589d1c932ae07
SHA51231b7d63755193035400bb4d13bcf0c7d0b9e2234919d6ecc71ef4302bbe746e85e549d8a793a66bc8370f9a018235c4f49740bfaca2eb7c501a76a9c87b33585
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\adahrqhl.default-release\datareporting\glean\pending_pings\c3853da1-0292-4ba6-9d2d-d20fdd51595a
Filesize982B
MD582cc43cff9acc99cb99135a040c2dec0
SHA1dc8506b4b77290a9db1d44d8eb3ec08a1f905ca7
SHA256a3522acab138ddcabc9c6a9120bdfbe14891e5ec8e84e406b20d752772d82d84
SHA512cc58582b291f5e1f7731eeeea5a6e323ddc02c34ca91e678da34cb4fd206a38fcba2933b0ea3fd8a435c32768c460cefee429b122babe5a455fc9fb87c06da3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\adahrqhl.default-release\datareporting\glean\pending_pings\ce21d755-6c90-4ac6-bc24-1339151381e4
Filesize671B
MD5184a68e3139e39e58cf81bec427a07cb
SHA122d535e89e6dd840805a95f784ca48df71b59bf2
SHA256370642b3701953304ff41482a492a95b86062c0162c3106406ac2df9cf053acc
SHA512b5ce10470b255dc9203d724db8448173a0e2ff1707013876460908d9e638ed2db79dcbf05bbc4bfdde4cb176365bee73ad7e96707f78a370b12195105631dff8
-
Filesize
11KB
MD5418db74e42e18ca0f3b29711db956a7f
SHA1cce99a41f7327bcba1a147c276c04226bb3a45bd
SHA25624c9c82cec4f4ab63e5073660e4409f3813d91ed5cf1c9e7a1f1ab92a3ebf40d
SHA5125c3171aba2b4e16032cd9f815ad40e672e0e311a0a4e23b1566d9eeb246d833cf5e6567ef6837f34c055f2463a5c6fe76930168fcc83cce54f4c28aec8ca335d
-
Filesize
2.2MB
MD590c72d2c718ef0e16579befb4aa2b193
SHA1befc0a75d30d2d3d20e9fb3643ac64ae587234da
SHA25608d9dda676460b38cb84c66887d30e0da4e5b37803fb5bca136a0d5534fdc6c1
SHA51220bd4bbaade22969c74f98a408fce4cc89d51b3ee59d4487a5f771d687f956a12e59a9ae15747bac29642d6995b1eed04a70b1c2989bf449a9de045be4d32062