Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-09-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe
Resource
win11-20240802-en
General
-
Target
45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe
-
Size
89KB
-
MD5
0250f610d80019f656b89802a8c106c0
-
SHA1
e59d5a95121fbf163b2ac94abdbecff1d982368b
-
SHA256
45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115
-
SHA512
95c3ad4e3126129461eadaa175396395d164a5ea0637c22d4e7c92406edea5c3418868bd198af04cecdb1b1dbce48ea6f48d8c93c329bd0462a0403a2be1a740
-
SSDEEP
1536:L7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfUxnyaO+:Hq6+ouCpk2mpcWJ0r+QNTBfUb
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133700961424242065" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4272559161-3282441186-401869126-1000\{7B3F5B97-015A-4F37-B45A-61653848BD2C} chrome.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 2728 msedge.exe 2728 msedge.exe 2836 chrome.exe 2836 chrome.exe 6252 msedge.exe 6252 msedge.exe 7020 identity_helper.exe 7020 identity_helper.exe 6312 chrome.exe 6312 chrome.exe 5632 msedge.exe 5632 msedge.exe 5632 msedge.exe 5632 msedge.exe 6312 chrome.exe 6312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3328 firefox.exe Token: SeDebugPrivilege 3328 firefox.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3328 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3320 1484 45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe 80 PID 1484 wrote to memory of 3320 1484 45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe 80 PID 3320 wrote to memory of 2836 3320 cmd.exe 84 PID 3320 wrote to memory of 2836 3320 cmd.exe 84 PID 3320 wrote to memory of 2728 3320 cmd.exe 85 PID 3320 wrote to memory of 2728 3320 cmd.exe 85 PID 3320 wrote to memory of 3196 3320 cmd.exe 86 PID 3320 wrote to memory of 3196 3320 cmd.exe 86 PID 2836 wrote to memory of 4736 2836 chrome.exe 87 PID 2836 wrote to memory of 4736 2836 chrome.exe 87 PID 2728 wrote to memory of 3420 2728 msedge.exe 88 PID 2728 wrote to memory of 3420 2728 msedge.exe 88 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3196 wrote to memory of 3328 3196 firefox.exe 89 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 PID 3328 wrote to memory of 3792 3328 firefox.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe"C:\Users\Admin\AppData\Local\Temp\45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\82EB.tmp\82EC.tmp\82ED.bat C:\Users\Admin\AppData\Local\Temp\45a61fc2cbeb181913e0dda0de473e352ad07227b9e1fade8174794c5dc71115.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0x90,0x114,0x7ffc0cafcc40,0x7ffc0cafcc4c,0x7ffc0cafcc584⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1804 /prefetch:24⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2096 /prefetch:34⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2372 /prefetch:84⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3132 /prefetch:14⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3184 /prefetch:14⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4404,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4468 /prefetch:14⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4604,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4620 /prefetch:84⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4596,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4612 /prefetch:84⤵
- Modifies registry class
PID:5592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5032,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5040 /prefetch:84⤵PID:6328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5028 /prefetch:84⤵PID:6412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5112,i,14606094436659531982,2134897108508123961,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4932 /prefetch:84⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:6312
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffc0c9b3cb8,0x7ffc0c9b3cc8,0x7ffc0c9b3cd84⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:24⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:84⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:14⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:6252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:14⤵PID:6784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:14⤵PID:6792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:7020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:14⤵PID:7084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:14⤵PID:7092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,3700013106678243543,1704850271561403255,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2972 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:5632
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"3⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1920 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {432ee214-6803-43bd-b076-7d1c17e41fa5} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" gpu5⤵PID:3792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae7b566b-2b8a-4778-ae41-3098ddf825aa} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" socket5⤵PID:2240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2976 -childID 1 -isForBrowser -prefsHandle 3100 -prefMapHandle 3104 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {15cc64cd-0572-416e-a635-efad7dcb5090} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab5⤵PID:2956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3728 -childID 2 -isForBrowser -prefsHandle 3748 -prefMapHandle 3744 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6705ecbd-0385-4372-b654-1f0f2970f169} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab5⤵PID:1240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4116 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4300 -prefMapHandle 4296 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2754b03-176a-40eb-8979-2f514a00480b} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" utility5⤵
- Checks processor information in registry
PID:5676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 3 -isForBrowser -prefsHandle 5528 -prefMapHandle 5524 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50c14d9a-0808-4bce-a35d-0053ef9da336} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab5⤵PID:1808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 4 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90a56a25-1f64-444b-9933-967101cc5f93} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab5⤵PID:2172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5944 -childID 5 -isForBrowser -prefsHandle 5864 -prefMapHandle 5868 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fcb6e39-c4c6-4cde-8006-646c042053b1} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab5⤵PID:1812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6212 -childID 6 -isForBrowser -prefsHandle 6088 -prefMapHandle 6200 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96d9be18-021c-4979-8e31-da8279ecd62c} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab5⤵PID:5656
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD53b8dce34771d7c9264d6462131ec0647
SHA1a392159cdb64994d7d27999d9dc8d398d19530c2
SHA256155a8e9495e9d2b35b0fbfba7d5b6725e5ef453eff719583b61dde0fbb5972a2
SHA512d68ccc6b05fa31519fc72c54477635e6bf32e26c229aac30221221aad95038400724d9cf6a6876aab7af58ca03ec45b5e51c13198bee76913e3a7eba8050380f
-
Filesize
384B
MD5c753ef5c56a599d9db852941c75d3d2b
SHA1eec71c68e465a1f4d899493f0f97f145728575f3
SHA256f9b4698b19eb363b269e8323cefc49472a8ced896027084289a151305813e41e
SHA512420ede2ca169d3fa57893f99913adf3eaa82d68e8faf2dc0624c0a552c245d20fdb6443439ac1f46f179c036187e864302e8ff098c6523f36320e1168fbaf069
-
Filesize
2KB
MD5769a2eb209f276ff5c0edad9123684f1
SHA17d8a99212739bbc0701126ea672d6aea31ddfdec
SHA256b5b51d140bfc7a918ef017184d614c1a1fbd2f07736d6d1b69795548ed230d12
SHA5129eb432d07131ae863ca0baa2295138e4f228676e797215bb14db99ceefbdf342bc957fced16266b53f34b8fde848555026f88fb6ec88a5c1215ee33bc5b74641
-
Filesize
3KB
MD55f811e2ba766f946c8573434f0a58a51
SHA15a5f1abbf58b4a7f60b8dda95e7a3c3762c2d45d
SHA25697caf116217fe27466c318ab9b87f13d81e07c50c8a3ee45f125f95e84f3a8a5
SHA512644286a29feb2c6834645ac77bd329cf4f46d535cd288401d8c224a4fb497e7197be8fb119e2949a82e60629e8df9944330a804a77500e9540d012ed098591ff
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD546b99e6859eece97ef4b13dd5d1dc1f8
SHA1f847f383cc1c125d5a67969df173284822b35f66
SHA25697b6c07de6bd63656a313018d6584bef4d263a5b468205397c7c6e7b184edda7
SHA512b13a844b6884dac3d1f20154882b99deb87655bfc11f4fa7165d1babbeff73d9c7938d1a31781011050a5dfc8eecca330b6b3f96445197b71c0dafab93dd7705
-
Filesize
356B
MD500771d72bb82f7f367f5d8bf786585fd
SHA1ceb70defcf30d9820dc5e3d3aaf12c2dbadb0a37
SHA25688f1655d9277a80226854811192f4bf50dc5f64355c968a6fc47f1f01d1fcb55
SHA512a142df89ea537bde2ba2281b6a1c20ce9f73a2bb90809b0d58de018450a4548aad64adc918883494d06c0a8e6bd9136fb5fd9e38b4c677bf02609125d3056db3
-
Filesize
9KB
MD50e9b921bacca60ea002fa00a443e70a7
SHA1dbf16659ba6f0dc903f1ef4612ce869be9df4471
SHA256b21b400eed69d5c6f6ecb24b96889e986dc59916714f6cb47be62fb47c2baa9c
SHA512838ccb558e83d0fbc646108e6df265732e4e8af3c019d2179226f495ca9db147dbb30296426316f4d7dd1cb88b5c325c685c9906756b1a74551546ac4b487cc7
-
Filesize
9KB
MD5c3ebd86bcd9f85542030612681f72e1f
SHA1b125d87bb90d566e739fc29c0879ed7ccf8f546e
SHA2561860fd4eb8f9d84c318a841ef9a9186eb7b0b91e8f5122d686c7bfbfd658a7c8
SHA512c8d179bac9b33e70cebee217724407e1a4c610e64e955ed952fd02b4f128dbb81fbbc007690824748835cad3f3f9ae9d07f849a2a20880ec764ab4b8420f4144
-
Filesize
9KB
MD5c0d582095f6f9a62026f2293829e6549
SHA10ef1a78179e44885c5a0810f4b2c10edcd5cf76c
SHA2567b193e27a94ff4de21acdd5dcf4a2c44deab5329fdcf66fc8e5c0197014cbcab
SHA51286621ec67bb028e502967c003ce72422ce6fe77f797c38e324551ba3dde5cc84d40111f69e9adc87c1d5dd589f9ab7066ccaba32c74bdacbfb8a35a4f2d48f53
-
Filesize
9KB
MD58985219689e7c58b9d3e2f78cc95a522
SHA1d3a40feca1a422e212c01344625acebf80b0c05a
SHA25661f7d75cabe5a99a40aae7c31a78a81efd7f4358b8ca976ac163e365b988b03f
SHA51232a0fdd015cc7d2149e026dd0320a61b0e0b28cd2f4b9fa16ee06fccdaa4d75500b46e5ea1b6fd6e202321195b9c815cb2af5c0fc55f71f2e463a91461b9c2e2
-
Filesize
9KB
MD53e0b1ba00a60c974f8f6d98fbe855bb2
SHA172e70b07e307367ed7f433e8b018170f37a00da0
SHA256446ff431b9cef77b02844ae99b36a487436747f95ab11ac8a8ad16a94bb26736
SHA512ea7569dce9e02ecd5ad2e5ccdc616aedc5363b6ed35f0143566d0f6d1c4ce67c28dacde48f39717d8774b8d1013d3c75220419d5972fa5b35b062ae36b88159e
-
Filesize
9KB
MD527f2adcab959fc019f159ea9534ec816
SHA1a2c662005e768064d0c5f0b8343cfc2b84c5d500
SHA256eb35af19bb19d88373cc386013d3407aa10c2874b4938697cd5c3b19d53e9506
SHA5127980a16b71edba8d1dfaca59759b8a42dac9b01feefa00f435b0adb72342654fb083e49eb2bf82f69bedbca6a142c1e9dc82c585d8149c7fe2df4fdf23255836
-
Filesize
9KB
MD57bd7ebf21e4579c2a9c3a6315da5d5c9
SHA1e306ccf5a2032b5e128b1bc0129db16f213f3233
SHA2567972863116fe0514576549e6df3a888144cbf250c07028575a11d7f1059bd136
SHA51249d9106ca6e375dc73f2584dcb516a03b348053eae40460a70ac81b49924ed67b753de592873a88ac2d005f19b313351b1d3414190b919630c3a8d1c8b8eb798
-
Filesize
9KB
MD5b1c3d7342a70ce9b8ec37c4061fa5a6d
SHA11db9fc4dae51518d4049a9b6ff4039f4ea151739
SHA2568e3ccc84854f5daf8627a2b461a9d414f6a1a059ce3f3c9b7c833638e01ccdb9
SHA51245aa814e724ec99980ad10ecddcc26a8a1ec5bd568160fe5ffe42273c8b01c6502a149c14c0561729b96e6272a0f6c6cb2c3049c7754233c3b065a97f1328f36
-
Filesize
9KB
MD5750374f0303687477fc130ae62649fb2
SHA161ac3a5e1cdd5377d4391598683e1f61a12d05e6
SHA256aab718a7af8cf9303ad33390575c8abf82206691001334bf7903b5ff2a79f95c
SHA5129a1674ee1c064e0245fda428a43cce2bdf3ce55e4ff45c697546d085d6d404c41cb105bcf0721ee9617ed8471cc19cea09067b27b15f345e6a48a2b1aa249f58
-
Filesize
9KB
MD5d314c1ebd7ad0838cf06d168b0452cf8
SHA140c0d176a3d1c5cac2bd3f9047bea96e468d4dc6
SHA256b012d9f3ca4645e16507a3fa68db6b8589515429669002c4d97dea00e5e51146
SHA512592ce86e238d7eb437c38acf2b4c42b4b04f77e780484d980e8bcadb6736cdcf66fbb84af29ec02c6b75fb1c45eb58d8f0a22223329390f180922ecd7958b0fd
-
Filesize
15KB
MD563aae0e6392bf11ed9024bb56ab632e4
SHA16e652facce09a74d1017b15063e0b17acf47d63f
SHA2563d8e86bc0eeeebb600f8773338ef28b3e839eaa568dc7e24d3f926f1da2b913a
SHA512a231fc42ad547bb1c82a9826ba398a6c533fb2bfba9046cf5d7db804221b3fab47f736b4b6b7bf37fa5a7691f996962e146517e7a4cfaac4d676c7ecaeb4c4e9
-
Filesize
205KB
MD5f0231569557e108748583887782e01dd
SHA11d1de720d64984d19c9857f35c63f79a048d97cb
SHA2561c8909a39ca4fbe73b0c2ee9f6336e16472cfe066c8c9c8ac39de32f6071005e
SHA51292df1832ef6dc7b90f2137058abd00f2160b9d7d25dec793f289af0aff8d7f6eb8de5f8d3d15b02a288ef11a91196782ddb217ebc2dfe9cd904dc6b3af1a8304
-
Filesize
205KB
MD56e14b16dd0c5b844b0d6d19e0034983f
SHA1fc2269061091a38b0b8897d44129fd4f359ee20d
SHA25678c5920a4db57169545f4811b1d0b752e2fdd96768beb11e538f790a47096a3e
SHA512b24bed795794e5d94dcbf831fd54582028d26e2ee00f0e8162012a2b69d5a38bdc43bff267b8b7c0c3fd97b404e3e772d55ece4bef8b479ec04c445617406ba4
-
Filesize
152B
MD50487ced0fdfd8d7a8e717211fcd7d709
SHA1598605311b8ef24b0a2ba2ccfedeecabe7fec901
SHA25676693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571
SHA51216e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993
-
Filesize
152B
MD55578283903c07cc737a43625e2cbb093
SHA1f438ad2bef7125e928fcde43082a20457f5df159
SHA2567268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2
SHA5123b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5f5ff7bd0249eece622c87ef4d2aea0c9
SHA1496097d97ffb8d2e8a86655558c7ea13c7a253df
SHA256f774be59429c6e57e3bad3fabde1c7c2d9378b93e65e53130bba2acba909c407
SHA512b258ead9fbefe707c00482bf3bd05e2e190abd6875222b889ab9924636ae578cb4c7f6cd6206c96a5a3c3ea34c0b85ead2c43b21a993abfbf85048d955e75277
-
Filesize
1KB
MD56f5b58b78b58cc8a4b21cc276f2e80af
SHA144ff23497c85e2b9cddffdf2b6bbef0e0084c096
SHA256d7f34ede72ae747e843169bfb003bd8696f75978a9a04a9778d65fdac534aa34
SHA5125f73ed2ac54eb7af88c36563582f98df138061b0aaef9c9c44b4618744c8648b9a509fcf4873d6716f8baade094456f8ed1a9321403eb3fb7ee262b405fa43f3
-
Filesize
1KB
MD505094b97f6728c2bde3d07baaf82d7a8
SHA165a5780c3ba142dcad80840552e455400a916ab6
SHA256345e11c61e7c21f3ef3fe5198c70d4220882a55e790af211f8ab990bffc2a2ae
SHA51217bed732cacb34c320556629b6a49080dc44643f5723bd56da4064a847b811a0dcf6a1a4f17a7bc291f072ab6142484e36250eb5984bbfbfb6c1756db4fd42c9
-
Filesize
5KB
MD5468553b842c073a27c30dd5c07a48966
SHA113bdb5a828f67ac6f7315e2c2e1b9dd7e85dc275
SHA256367092ce1fcad5cab813517d3fc43150d49767c0b58299c7a258f2451215b0a8
SHA5128c2db9c9e7b9d4ff3ff79a0a8241605963a1bdee0ee529394e0aa040c3b14f506dd1f1cbc944a995a3b6bb0115096081dd104bbd0a117508dee003e67b6d1bf3
-
Filesize
6KB
MD5f87f6a183b5890781845adaee928999e
SHA13152ce86b2a657a26d0c150c6c2c0ee637e40758
SHA2565a4282ac1af144427d2a272646a2cd3b1928da6dfabaec1c74dcf665e66cdb93
SHA51260d643f89d47fe744a13b434e3b566bb3e056e7d36c0be72d5473dbe478078a2c2bd1f7806816e543fa157a316e3b0185c94c7477c4fb29c1ace2a88922e4379
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD553353e9162c3752b386bc8413a4cd3ff
SHA16fd544f19c831eeda36027521c3ad762dff9f2da
SHA2561682254035a417a8d54e8178d27d7dd60f84ad5038a2a147cf65de5f339c6d48
SHA512c120b9ea668dbf013c3f8794a81ff63399da211601a9e0f811d20ede955d5983d8d041eb66caa312281bada22b3a94afb6ca4742690a1e34808ac333f1ad8036
-
Filesize
10KB
MD57afb3a11c61282746b5d8ae55ff8e75b
SHA125501b96221b76a5b11b3169608328d1b7414d9d
SHA256f2500f09996199c2b3b79d370149a5318881ed22e29bd66d810d2bbdf6b3ffb0
SHA512430cc46029282305de4d4d3b6232202fedac827f9d161d0ba8e09868a9cba378c16541ea4f0418b7d1ec84cd4a11ce6d7ae4e2f6aa4c11ae0ff70834b6295faa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9lt6socl.default-release\activity-stream.discovery_stream.json
Filesize33KB
MD56ad65f36789fc9c3719fd289dbb15245
SHA12d19f5aec89b24996fd517eb95ca2f8d05a87605
SHA256c5044f53d07c661d46e870777eb6e8ae783f9dd39acbba69e9472f8116b540dc
SHA512bd8093af953a614f94781a351de20188c86743132b8b83e5a9b48525512a4d00fac88428f6f8af2531916ce10927e0545d4c53c4c0e1162e412331f9c169d800
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9lt6socl.default-release\cache2\entries\58EFA56DB4BFFECB0EDA547894BC9A057159E22F
Filesize13KB
MD5cfe64a0b7ef631df85e8d97b1ab0b13c
SHA1316562c076554e652f90931ad1643e6d90761250
SHA256e3a045d2c074488fb5429ad78591e1bfbe9f99f43e4ecaf3bf74bebeb1950091
SHA51225d46d4b12c632c6e6916986550595c0f063db5a60637b3af2e6c28ce14e8786f35a5f654a28f750e007dde03b0f93219871687f8d3f89358d054bb43902b9bb
-
Filesize
2KB
MD531c09b550c61042384ef240a1cd226df
SHA1731fbe63179f646915f8fa37ca9f8c85fdb9b48a
SHA256752a176e12900c9f3cf947bc36d506e360f86da00a2dbc1e5fa821f2584c75db
SHA5128fcd654736e4b71765b5379c6e1699771e83c5c1df1b5e3fa7f74e4d3b5629ffa1f54aaedfdf9979416d3704bcfb38d73dba7c36c7b6f1ac9804737e7af698a6
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\AlternateServices.bin
Filesize6KB
MD5c8a45d48a33394f5c372e27898989ff5
SHA13ecbb613db4e0a80f6ea3badf0018885925bcfcd
SHA25621c1893dd7e1cf763561d458c03e967fbe8f477591dd146a966da14c5108a3e0
SHA512c511565e63e4fe5a7f97fdbd609b41fde452167c7224563924976561910dc67e6d17f5c53361490cbba54f929e9ef109f574360e13e11cf8ac87f14da0c1825f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\AlternateServices.bin
Filesize10KB
MD5995542d024d572f9b09798a2476ff48d
SHA1d98d736937b5944253d87b667f353ff3774576f9
SHA2561ea928366030b58bc3a390d40996e00ffbbb5e84de93581bec43c92dde15f0c3
SHA512ab352b4f2101c7f427772f2eeb3e432aeb7f792d83e8e5ff5435a207dc2538ceb630081c49050efb056fe489217d8fe58285a15a229629750e416c346b6e62cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\AlternateServices.bin
Filesize12KB
MD5db78b6cdd60273e36d4b4192690fb7aa
SHA18aaa823ebb4d2e9acf8c5310aa31337bef107b7f
SHA25648c72204d179d810f63b0b8d49069e699a76326ebbc11860f226c005fa5c14e8
SHA51259d8d8f6022515154eec485a4cbf470917865bf0a7cd99c015dff8af72a0dfa7a6785669b8c4ec1b886dd0fe9d1314e7f8b983ddd22e695034fcce735922f9c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\AlternateServices.bin
Filesize16KB
MD59ab57239dd4b6751956da863f328068b
SHA13daa0bac34d2e05ff8d5bf73da70863654a546df
SHA25602b32fcbe70e1803f0839f272cc21fafc707f348cf1dd32169ce869bdc084289
SHA5125dd470c512713f36515c710ea00a072e57cfa46d4aaa8d3c08d6bb3c894018dd322b6a067c14f18fac4743bdc739ba1f6945ce3d0b64e28c6708a0d1755fbeca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5be918c5886c85696106dff3a9521a892
SHA1283a0b8e7e40a616e678c743e9ff4e55cbf0a1e2
SHA25692c93092ad0689c27ff55643008e38a4ea20f7e048f3bc4a1f2694953951d3d2
SHA51237655959bcac3b9b9f6c6c3ffd662adddcad0e8ad8047ca8588eb27d853090b74696c2cee1988e6c0ce5b042b484e00f19d8c1dcab1ec3d859c4591d1fb62be0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52aeb8135d66fe3bf06ef6dbc6fd6e6dd
SHA11798d971fce75fba5efc1153109afb0c324d8c9b
SHA25613bf8e764ae4b26c75d99d1b9667b5d3e39b28edbfed95630aa86d374d3a734f
SHA512acacfc79f21b46a28af3d48be7b10e9d7e936c48a3677005ef211c0690623154f09b7450534306a6341cc95cc3bf261dddf4d58ec9a741a293a78a04bbf293df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d952133e8a24c1547e03650ab56b84a0
SHA1b787dd63cc1281b9206fa084363210026be37eec
SHA256826e8eca5255b8e11a7046ddd5d5ceb58c138db349a6f8f13a9882416ee4b9d1
SHA51216b34807695d31617582f599dc779383ffc7235bb78dbd99a9ca55e51b0081a9b83c977b6d9ef74cd726e5672338dcef969e5c979b0757fcc5479b3f1a940302
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\datareporting\glean\pending_pings\24e684e5-5315-4c8b-b971-7906ffcd3316
Filesize25KB
MD560bf6b237d1ca36411c506db60297b23
SHA1ff6412ec81c1aeb0a4b0ce3ee1ef0949fd9297d0
SHA2569a92c9fc9d7f73067491e580e861975026b47cfe68c859c336796c3c4b08cb5f
SHA512c39639c77df02761efa8e4555e7d1a40f615b5ea6f3aa6b86622b15c61bcba0284828c1e80b4c8ab3c85904801717cf740eb179cf3068e0bba14a75f80f83899
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\datareporting\glean\pending_pings\42e97933-5746-4b88-8350-aeecb207e141
Filesize671B
MD59edd4870d7e4dcd56a8fb7ee41292965
SHA1c7096d59dac8f4f83b0fb2b80518f505b041cba4
SHA256acba476e03f7e8fa859885b6b480f77755cabe026161edb1e6368104bfaff3db
SHA5125481da55d9c61009927aa3f8832320fbe7784bd5d05f219962b12e98ad0a6d982b2951bf3ead2c4bcdf36126f57afdc980e259557e2b7c4f36d55a8e69895fca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\datareporting\glean\pending_pings\6b0b64b2-0d4c-44c4-96cc-6c20225c1859
Filesize982B
MD5747154c17878d48d6f0b6513ffe020a4
SHA1032f00422b204dea2bb8ca067023c0e2fb8ee8f4
SHA256430d1e03376a27ece773117eba6ce52b477856c9f2a0d869a730ef8287dbf514
SHA512c443ca36e899fb495e89d4fd3edc5f7b93699b4b07ddd078ec227cdb10fb281827901dd6869bb3ef384c804055c1f4c799c0742a1a25104700c3741ccb2657c1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5e1e99e1c96dd1018fecc9207edf17d95
SHA1ae554b69940b24e90928a6cfb67bca34b03de486
SHA256e7ee67d6ec2b930df10a16ec1f7e46e9151e1b24f9b65c0dc3c5520449721f14
SHA51224c05b69acaad4fe28d6f3e71385e54f7500943be96612acefab02f54c23312652f1b242be766702af20e1c58f733b09667c0504dfe14a7ab619abe6e06d5a4a
-
Filesize
12KB
MD5f77adfda101a6e0f77dddfe5c7565a45
SHA1fa2dd5791f5fcb86d0826aecb163a18d7ee761a1
SHA256f992fd88e2ccee2b9b282b83192aa1903114ac0d1e9099614c65bc048b3719ef
SHA5121ed5e2af7a7f07223d0a14ce1d4a94a44fefddfa0bd07ee11d919ad90f0ed32e1a820cd4fa782e24982a221b41b3b026bf8d3eae536cb051708626aa23cdea14
-
Filesize
16KB
MD54f18c013112880d706436ec7611473c1
SHA1c7eae3199dc9df930ddcda2f732b9c94df60a334
SHA256ab4e6a73b2aec4a48438c957bbfea642978085ee033b0d1336d26c9c0117ed73
SHA512f03d11bfbea08baeef70c1a3f6bb766a53edf0f07b9dce1e891cece3e057109e56b40679e2b6ee66a7e372028aa44c5f8d82a37c8d78c222fd24fbea66383c0f
-
Filesize
10KB
MD523c4d1289b143404d67378422fc42ef5
SHA1144d6d4200d702c53010c3275526f73d4166dba5
SHA2564b026b59f58f61b4034d1d2d3e1cc79ce09d0a7b3dec36d53cc87a22021a536b
SHA512f0fa42c0c651f6c149fcedb050f51d2ff154e0a92e0201a654a524518ee5b4f7c58bc11cc728834de259b9e7c939028df5e7c073d77824d3c595b3ddbf7d28d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD56de9e86dd45c4e4dd3619dbfbbbfb419
SHA14aa981ff9abcbcad6145efd9402e36f5ac137e31
SHA256afe8af185ee868948a18260a4525b47c805e943802b9899844eba1a12ee80dbd
SHA5122a1b5333d9ad839fc9c54b188f4fad46f6eeefa3859487603ac1af14990ab8573a12a9f0454ad9ccb5eb7781d061f7b5c5e84712e1d2d7af0914f3682558cc57
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9lt6socl.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize376KB
MD5d1783d5af9066b03e5b2b100318a9886
SHA15b3b7cd1e62a8506265bf970d659b5fa966ed47d
SHA25641c94a266169fcc9fb5029088c7135d1be8570c95c67e068090cf83801bc67fa
SHA512ebdd7b791344e77c6c5ea4f075440f382532bec9cdf2e73dfb5077e3fc8c3867c29593b518010a2ff19519f36f993c451649c90532af3b73fdda8d40d6239f90