Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
367s -
max time network
372s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 12:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://library.lol/main/C795CBAE06997524A0376CECB8193601
Resource
win10v2004-20230703-en
General
-
Target
https://library.lol/main/C795CBAE06997524A0376CECB8193601
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133369235959971034" chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Version = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots chrome.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2312 chrome.exe 2312 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4820 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe Token: SeShutdownPrivilege 2312 chrome.exe Token: SeCreatePagefilePrivilege 2312 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe 2312 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4972 chrome.exe 4820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2744 2312 chrome.exe 82 PID 2312 wrote to memory of 2744 2312 chrome.exe 82 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 3884 2312 chrome.exe 84 PID 2312 wrote to memory of 2660 2312 chrome.exe 88 PID 2312 wrote to memory of 2660 2312 chrome.exe 88 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85 PID 2312 wrote to memory of 5076 2312 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://library.lol/main/C795CBAE06997524A0376CECB81936011⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadd019758,0x7ffadd019768,0x7ffadd0197782⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:22⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5212 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5676 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5680 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5560 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=6048 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3876 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4832 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6076 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=956 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=6072 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6260 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:82⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5556 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6440 --field-trial-handle=1900,i,3390776486650578479,15711578561299404884,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2364
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\07b576fa-0064-4cf9-82a1-7e684d68999c.tmp
Filesize7KB
MD55d1028e1efdb4e8dc4fd81ba37c0d02a
SHA1f42f4dae341637171fad82956bd2980d3a48be27
SHA256fd16d47fb0821f82cc24f6d03f9ab9ca691d984c7f2a01f1c8733e1642292874
SHA51221b1e238e27ebe9c68046cb5f10a4c968d2b80e6ca91757c89ce7a682fcba0ad53f0b8fef4419d22f87de8bdebc6fd836d9eb96d2e6f66682997be9456650ad3
-
Filesize
43KB
MD5f61e3a7a59ddb7e50a2194181c9a15e9
SHA109b98744b0fcd4c3808809d093d68d453ef4ba39
SHA2567604e0e44a2b422910877af420c9ea1d338431d997bed45d6e69a05c8dd626df
SHA5121f2f5c07b765089f94eed44327b5acb77ecf9d0aca42fbc035f5d53ca046a3ae860d2a18f7ed7d222ba6763570ec557d9dc4f6a3e7b17ddb04dcc82483b14bdf
-
Filesize
97KB
MD5bc5f53ca0c689cc361c30304af9c0a36
SHA1766f6c6579fef38b004b64e3bc482ed7bea5d028
SHA2560319121251a72257b996dea666e4f7de94e5828803adafa85a903c0d8de5dc49
SHA51275acade145cbec60acdfc02142b88023ad4a051e53500fb14a4d611ac1c6635ad70a0aa466929922ab74c79750a1ae189f17be75bfececa298551db8baa51629
-
Filesize
49KB
MD541271aa95ce9279e21605356e7f78192
SHA19c75b74bbac6bfe157547815863766551f0e0817
SHA256c61c5ef737655d1e154bd6fd0b6811ba69d9f33ecb0b72a1400756fae90bd3ae
SHA512a97087f661ea8a2982f1ab9c98cb27b4967164d0cf6857fcaaac8779594e98dc5afed6c1968b744b6880535e23f2f807acad3f58edc0a0fac27415e66563dbfb
-
Filesize
451KB
MD572130180b525951bb4f8adae02a3d553
SHA1e0680de553948d4f95382608517f579aa7aafb41
SHA25644f501ececc823d8d17ac647eb02888df25596ffae410342fd7f726a76693bc5
SHA512f51b57ec3a6bdeb5958205add0de10439af076010e916d7d8b6c74a80540b92b6a2407604abda643d5388ff981068eb88ebe2f0a0a77bd0baee4444cf44ad51e
-
Filesize
43KB
MD5b0e60b5cea71cb1c05ef1d6b1f043eb3
SHA11aa5f1b2c97d98543d42b4e1e658530e3dd16c31
SHA2561f6f4399fdecc22255a59d878719bf7cedd5d5c9f18d8b637d45e4c30df236ce
SHA512044c7479c5d4b23a7d4503b03f5621eb26fd50ec6e4aae4db703a8bdc019b0f450fb8f50412839c4f7c402554e92b8bc453c20883a34b365c05fffc70c15ca66
-
Filesize
23KB
MD52cc01cb163cae4b5107b8baba1221b9f
SHA198f5b18d408af37364e72eb956d6e5f9d4fe2fc3
SHA256a5053ebcd1d5df944de7501e202e69721b58b53b756cdb8da92721b48f1e5f8a
SHA512fd1a99aba16572d35b4eadc4e7b58557644d26c328afb910dc9b5b4e36d9d36631cbcbd06a05d0f0956bcf80ba90c3cb09469c643344c709663dd278687b4203
-
Filesize
22KB
MD5cd586f57a14f1e03c35e6940d930c0d2
SHA18a68d0ec21850893d761cce80484eaeb799ce05d
SHA25622fbc9cb7d215e8f7d94ac54909e745471672b3429b1af5fce3c556fe4236c59
SHA512c33ae70500b2b2182967d4571a3eaf1be39c28742ab74bb53cc75b3870547d3e898582e5d65ca77facd50c85681f8b5638db7fb3b3203bcd89b4704cfe0eb6c1
-
Filesize
21KB
MD5f136bd23411f6f0784020bdcfcd7e001
SHA15a998cd6ddab1507ca90e38e4bd295da0e2b4d93
SHA25655cad3afc12dd45ac8c717ecb1a2e4970bbf228b6bcb0c0440157235b1b7044f
SHA512c70111ab68c7176e0c46e8c0b7f51bddc7581818102adceea1cbc6d5541770161a6cc43ea738a3cd363fa7d4ba9dd8dec8347d99b70f7b276b1a6ae7393b77cb
-
Filesize
21KB
MD546fb3c52a145d99b29a15e14993095b4
SHA11ebcd8a7371567eafb0bf67de63a67d61627810a
SHA256681c9f341f2f5e227f07eac52dce5ff7c3bfc2b57cc9c6e343572385f80c4d06
SHA5122734a340121063cd05b5734079b0affdf2a29a2b0289a3c4e8d5571f40e8c2b4fecea091d3077d5bfc4f6ea233d2c663c02779ecb722970df7c3c7001aa8bd2f
-
Filesize
21KB
MD5b2a9920c6fcf499503c4e094419748aa
SHA1b0cfc188336257a2f28a1b671db84da5e25c8584
SHA25691541f8eeb5078936e2851a2611d7216ed3dbc8b2ebfd210e1785d8637568799
SHA512eca03f5ded0f68c86ccf7ff0d3fa105ad304c55b7214b35bd367c0779e1bcfc09e9643371f29cad99db28f43d44b65cad1e0106577191e9d0a0b36bf381e8b82
-
Filesize
21KB
MD505520db2e61465f678b6f774256a21d7
SHA1262b0c005e39c66f380bbd7d3b09ac7d977df19f
SHA25689a9a3ead00f8215b878c60ecd79b7dba627b80bdffb75b7629af092bb37662b
SHA512c02e2a18e64281fb323952680b773ea1e4b176510099749b65029cb069db7702cc3f1a71276e3b6fa9342d867ea37e0f110ddbcaafdabd821b77871c3d997e9b
-
Filesize
181KB
MD54c75aa07dd23352ee1225b5a64cc6b59
SHA1387c73c282f9b15d8f62b2c9d830945772c88c7a
SHA256edeab1e3b20750bb1c0d394b111109c0c7ab74d34117d16ee1487cc1cb8c23fc
SHA512a0e185b33114a19e6ace4b7f6af1983c45b124ecf4ce82f92ff832ad9a57ae895798ccd4473a46b9fd530831482b3ec3dc729b10c2c85095a54a6834c563d86f
-
Filesize
72B
MD5ceb147fc410ddadd984db15c08b6fe42
SHA1e589b37d8fd749105bb6864e43141451c8b64fc6
SHA2568fe0cce545033661b05b131bd2d4bbaffb3077fb548df02b0e9775c57ea7631d
SHA512c07e1656e07d2d650e2ee0c48f1cb482fa96c424fe32da1a3348ff44f7b7daf6d9893fd26083bd7df18ceb23afbf1736ee90a7e3b6a5ca50dc19606322a7f39e
-
Filesize
360B
MD5e4efc5653e5ee8506ca5ca965f35e3e4
SHA10822eba70f42348ae5709090a028d3ef92084c17
SHA256b3b36969d9f64dad8e52f0fb8130f127261f31eff8f1191501a6ab5280cda92e
SHA5127f6bf2cc945f95fd0202b3f4f19b01c7bd76ce0e2079e9074f0221c8167b652401ed1a78771067e2cfa4bc62f988e2e629166db503c1e2d764331045c8e4b2b2
-
Filesize
384B
MD5e79e05805f0eadb7c295166db4c1210c
SHA195767ef79b3c497b3eb6191d39a2d7f6ca04730d
SHA2565d963d41a638ff7abda1bbcb51d9afdfac0c8998067dc7a1881b66997470283f
SHA512eeb3a8e0e3d04bbc0eb3f33d71fe2815b0d31d3f28a5acad5945ceaa32444f45f70f11952243d9097958ddeaa6f139487cc1dcc3cf7a2a800c4d366e1174fe20
-
Filesize
312B
MD5ac9157cac196a38fe1a5c4585f628f4b
SHA1b82064182800a20d532492729490f121c422be56
SHA25670d226bd87e8543ac422c91a983723b63f0faa4b819c3276dd38afcda0eccac4
SHA5126d42d1d5466dfdfbcc26e1f49b1513b45225b110fd215460b580a0665ae7b838862e61ba2a70df50882736abea92644e17d60f08051148696d1be2474fe52ed1
-
Filesize
552B
MD5cbbe4309c64f3a97b93bb8b9ecfac6cc
SHA153908530de547723ad9e2d0943849459caa5e742
SHA256f659db23e98083660bb8e969f587a46a2d2ac13b17faf9426a93b9fa568d5209
SHA512ca1296516e12b9e028844eee62d7628009d990bb39523612491f2bfd4dabf60d618eba81438768f3e5cd2f44615de822c923955a5078642c11015ff47ceac9fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\61c59fa3-7fa4-4f83-8214-2c88a20ac0a6.tmp
Filesize2KB
MD52d71f9d5a1cfb000dea029ceba484e45
SHA1c890bbb38dd87eeddfd0e98d46bff2114c8e53ee
SHA2562f1df48551bf878e9c77f549c08f3f2510c9bcf86fa2a070ca043fa3df197e26
SHA5124378efd72781874607527a318f393170acba7cb1320c58bec6d884cfc85a596b612f616ff35e51709db128c2ff38f6ecbee93ececba2f0aab4aa03a6ed0c9d4a
-
Filesize
1KB
MD5301e62d035130fcb3f03552cde5f486a
SHA1190ccd2d3c56e8bce8d150672ad7f3b8d6936ac8
SHA256c056347907bb2fb88fbf88ed61aa36f2c2d4ad8ec3b9a91e43ea366d1dd0ef0c
SHA51256959bd048af3dbb2fc888493714164608c843075a35f4bffbbd23c54f673be6356408806957d66d2685ee80a500cd83d957f299164708b2e21a4f484187bc15
-
Filesize
1KB
MD5f673167b1cb5922621b2ce46354c7f5d
SHA15bff80d8e0e59afc854033dde4a2eb856c08c7d4
SHA25614762b4250622eb83277156d819959f08ab939cd79c0d365adb16baa738c8322
SHA512918151a04a9733eeb899d56844d391a457e379c526b48e7d53bf98983cc8eea07fb29658ef104a7170a1d21a5e049189daf4eebe6d4cdb1b6eee47e845ebe730
-
Filesize
1KB
MD5c796912919ad14d5cf610129da889978
SHA1b04006fffa00e49e6b68eefff6bcf627f89c93f7
SHA25681ce9c7a5d55c8e6132b00ba797835808e5d63fe0ef12f722023566b1e5b3020
SHA5125322f0f407961d263dfbbdd81faa38c0148c8363596f28399653c209d9e27d4b335c582076a3ec09d51ff339b5ac45facf88c7e457432a4b5b666a2f1278d4b3
-
Filesize
1KB
MD5beb1ca50d1f9a15666ad9c56db961b34
SHA16a788b236e773a701e0b7b12dba845b4dbaf768e
SHA2567d3b1c6775dc51ab9b20bd21687ec6c971fc538f35f5239d4215529f136daa3b
SHA512f0950bf107e47f7ab35b49157262375050568dcff0c16790233aae500d8c88f16b47ef3a78fe03e4b83b9a8f96a930eb713cfff1a7a6522e2839f63bdabdaccb
-
Filesize
3KB
MD5222895415f5d4615f1721c26c909fb0e
SHA164a5b65323edcef8056f21ebf0fc52df1204880e
SHA2561b839097f977087353f5a75b76456df273c2d8506dada04942fe1d5bbb637b4e
SHA5125ba6b27c8f94306fbd5bb5e20630cd766389905149cdec1363948d26c773e8c38352f063f0a723325166afa226c4bacd765ed01bbe843f12d4ff792427c5da71
-
Filesize
1KB
MD5700e6ca636a34d4737b734b998304e2c
SHA1181bcee32a57121edbe94e5566e34cb427070bbf
SHA256ca2f3b18b99d29ead0fcbe0a3eae74711768975b8282bd25024f642527a58e69
SHA5122b4724e8df545400a7670e77887c867f4c8a0e218a9f1f4576d6a50e8b9ed40fa0bc7584b2b59859621f9c6bc9ddb950b9b4293cd7b4ad5c515e0f0dcfdc12c1
-
Filesize
703B
MD57c99830f5aa491f2a2de1608dbe73880
SHA17ab12fa4ff628f35b1623f495f754f76dc9b203a
SHA256585986b946172b403d67546fa8bf8a988c6615898c12236d9e71d46a942bd94e
SHA512617b70537e0e7f443b58a11462633ab365fd83399dcfacc1ab0319f86d4b86f74421d4033ec17add1b2cfe947ef960f1d37176f914bc0ed8dfca02f730007fab
-
Filesize
870B
MD5d32b89cf7f22e5e180930d2093247334
SHA10a2172b4ef3845d5d2efc29edb866e554b91d5fc
SHA256596fc04e67ca025bdd4025975913d3c7c8941f7be4ad036d3efb028618683b38
SHA51241e84d6c8475d768050738d6cfc58ec5c1f165bfd6b4da0fcaf63712717ab406b0709f2ace2fe85fa85b7df1b0af48e96eea3dff3c677f8a52b1db6b56aac1a9
-
Filesize
870B
MD5ee46a2443c0ea3e3ea643530a503cf9e
SHA15e56cba27ec2c3b2d1a39a013ae0f7c6324edaec
SHA25655a44cf3ea38fbabb56481d9b00479ebc9dc626ccd03ea8cc55edf1c4f23f4e0
SHA51238abeeb3c36f8580473f538bec0113e5c84989c8485850ed8426ede44c5b1305b1e8b138d97aa5939f37c0bec1bd13aa887ad37bf8e0f368ebbf47e14fd7369b
-
Filesize
1KB
MD57215f6da4744def3518710cc141a455d
SHA143c0dac194a8123b20551f4dcd822d1a25a976c5
SHA2562e7ca1c78e0454bc311c9df75c59a8a1959c3355c8f42e5e25f587236d0c4549
SHA512602131c7a60b98ef2c134262acb53a6bdc25d5d3300b46ca2c020807bca914c8c19e2ee6577ff13302431c8b2698789c5911f285359fcba10b4efab9ee400c22
-
Filesize
1KB
MD5270a681b651966dcdb98db4c1c479ae3
SHA1a3a7852b8efd0992e90a913efbf0fb36566ef3f2
SHA256e9e9a556c05eaed84bf47d4355cdc0f4decf58a1702f9659ef3b17f379dcc225
SHA512509797dfb160d91c18e7d75757b23bd89b95110043581b8310712622a4f5c9baa9fb373e9b0ad2bde2655bd55c63db20059daf75e37dbebd0f6305594145ce0a
-
Filesize
1KB
MD53a1eeb4d2c413fb313951d8177139b06
SHA1e8a317dc4c8a508246cea526d8cd7bdf4a605c3a
SHA2562753787ffefedd7ea5c1ea891680de575e88cbdd114237d849c1522eb94c202c
SHA512599999a74b5891993bd5d3e8e81dfc05f1cd37553d98b47adfdbeac01862143eede6c1e92da66297fba9ab9252a98ecbdde94d1fc73432cfc597008348dee874
-
Filesize
870B
MD52aeeb59bb7262d0d2172ba90d0d7fe65
SHA1ba5665a1011fb80a9306198fd0efe0555248309c
SHA2565cfbb64749cc5855a976caf6c77a507ec2260570765c091eafb51e76ab3fe0a1
SHA512a6847997d7b5945229ca5aaa80a813dfc450ba293eaa84acf949aa02811605be79442da0ad4b4cf3b58bb0b889fc5ad8b345d3f8118dca2901578bd55f1543fa
-
Filesize
1KB
MD5796907e53b8a1c544c23b4fa750d78b8
SHA137c00dfd37f4c35eb1c50f43f743cb2201fe6919
SHA25611a9449cbf4c998f1ae61b83d8773bc1906986c3eaeb310e6be3209ef347c944
SHA5120741ba7950e729c37ec4e30d8a4f840754caff775a1f114afc88f56bc213eef09ccb3e702d36b5f94aa92e73761f8b095db6a27f64719ec58061689835173724
-
Filesize
6KB
MD58b606b83a7cb9faa60200097d2930e2d
SHA15b033ab5601c769d50c51ba0ecfea7fbd4094427
SHA25689685be757d6c3bfabddd9a7a8e302b42d64dd25507e280ebd48b49f26130090
SHA512c01bab2b1a84a9b2059e0309bdfe6b4d00c1036b97536aa6ca8d0ca0da65385a23d99fd94e3ee51177730810acf50517b3b3aa8b6a2de47af384b4558c7dac66
-
Filesize
7KB
MD5dd5bb4a52ebe1252d5bc433878050e72
SHA170c1c5a6fc961c857c8a340acf00045bb2fca75e
SHA256422eb23dd32c5675246f4a26a1e818494d84c3ef359229443f29fc75cef9b981
SHA512f0f11823a664d75b06bf0101249a8a1cd97d8e847d49de371900df216cf4468b037e98ef36a26c04e7122e481df062b18a0a830614a6793ad99edf521fd9ceec
-
Filesize
6KB
MD5291f4b82b4bf50e0e3373a89b8685ec3
SHA143a2de01660d35f9c149663969785c7b27d6fe9d
SHA2564f12faa3a38d888be8a5d2f40ff70b712ba198ed70726c89bb1cb8428533e79a
SHA512604b9b0f82bfaab1ca4c99992f8fbf25e9cae8dca61cbeea2a387245421beb33f9bf8d86a0a86f0dc752176cb99f1610885946951ce025b2b44f92ea3472da8e
-
Filesize
7KB
MD5f2fbf7603cce52ca2fe9d57c0fdd6c14
SHA128bb288c8de8646572730e5a45998f19acd4143a
SHA256d8cd4299af7cc7df7b75ccffb0e89a60829d47c0ed85273323f53b7e89746ab7
SHA512e46fc1eb473fa9118146b02c36d30df6ef953d24c76653f7a78a861402ef454d870d5c108effc3c99d4f52f99f4e14913462d83a09c7fd0cc3c2dd2ad2034e12
-
Filesize
7KB
MD52cf80c17db24ecc17f93ae9018ef9a68
SHA1f8efe0fd03a5a78221d84e593adf0f7433896ae5
SHA256cecdaa9a19c6988877f69cc511405bf47eba597888632fc35af9c902e18da483
SHA5124722844ad3d520479f700e6054a7b5a5e7bc0daef2ea0444f1f010060a9381be868aa3d214544faf1889ae878140343def44e721775c9ee6947c612021dde3ca
-
Filesize
7KB
MD5b33c5a6231977dee337276612caa10b1
SHA16a9f540bd74c0705a78321ab2fd5121f4ecb3578
SHA256c8e0609d44397d48076663113e219f71b4db8629e0bc46ea1efc7f9cce9b0984
SHA512ae99936a71e7fb6de63101db016839f4c1ecbe1b22b04f27ce0f12b496c1e2fa717e5d011ee89171a7732763587b66c4825d2609732ab46918bd81b8c9dd33f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize48B
MD53911184f38f0c581dac0d29900a67ad2
SHA1b49f214579ec9fc9cb34b4992e862572fe511960
SHA25617de7e29233e96135ccae7540ec58691b855814a43e800045fc967aadd288f85
SHA512e6fd6d2a99bb51eb8e3e6b0d37274ea4a49364fccbe240d9fbc8efee632d243a593b6b8fde1cb9b0a979631d79017121e6929cd0f11e8cd31a5fb02684a39dfd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize48B
MD58870232b0fb7d2e75b1decbe23d3c500
SHA17548b874474f0f054aa06c2e4b80f0dec1ca9051
SHA2569a546ac77916b17da57205e82e9a20e7915124225714debe3d6870abf4c69cd4
SHA512f8d06c719426733f367a090ae0787cb5355113b30c9b18ef1743b25e719273415ffece1e3603094a7fdb1ad07ae13f6126457f16aec5a35a26a4242d47895b38
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59455c.TMP
Filesize48B
MD5bc54e78eea96b4e22c3eb751dd0ef7f4
SHA1dd03c98c02bbd8a31f365bfc4c64ef0573c3bbbc
SHA2568edaa37010c25156595cbc412a063ebfa5ba6a3991923440d68de0afd10058ac
SHA51229d9ac592e8af40b34429d7e5487d36fc5cecd46477ab9695b06a4c8c00105dd5fbd532e8d49b3dd4c70aebd7e26b94d811fd5feb8a4de2cc80e7194c05e4482
-
Filesize
87KB
MD5eaae522e2f98a83f5013c7a9dd74023a
SHA1783af927e73fa21a0833d634e27a1107b6d89339
SHA256fa707f3cba1558db5f79cf920339cc043244fd0633706f7d7e8b865b9a36663e
SHA512ffaf362ca0c921ff34613c01d413e8b22c0d5cde8bcd578f54546084fad53d7368ec28f6354a69c0cbac5c410ca7d542ab2a08cee24136398b26e182791ccbb2
-
Filesize
87KB
MD58273659e206107d850d554487c0d2ff2
SHA1901c0718d9c8278a42f624055d49f9932564a8d6
SHA2566a27b49f72a6a355fbbcbfb3857480adbe1c0bcd8760b17876d8493297b8cd54
SHA5126fd5a994d1c012baa6f5289feb45643a2226593803791e0b335a6e39a63dcde98a6315a159f19a96716de18cdd8a600bdf40c520d4159f4b72ee39257a127215
-
Filesize
87KB
MD57cbc481879abaf91707a42748c61d108
SHA14030e868a3cdea4ca1a20d5a6da63cdbb307f250
SHA256de0a1c78a023b5340da9af0fa86c80ca82a5e44a0853c68af67c01b917dc8559
SHA512ea15ef181a0ba292bac96c25288307c5cc5fb4dcd815e1a1897c1e908cb1beaa805c42941bc2418e64dda58c4232e9ce43b95a8729aabaaccf7bd8ed1bf606df
-
Filesize
87KB
MD5079fe0dc07d74e151ed324d3030d5ce0
SHA1fb6de03a2ae27b7272bcd0bf3ae245ad6ef42ef0
SHA256d7b2c2e811766648546fb1316574a4b505995dd96d5339fc6f1fd21edb32a191
SHA5122210857cfc500522433097f04f28e584edf6a87cdd1758288cc7fbc638f5057858b07579f2c1453bae5995bc94adfbaa507bfb7c9fb2ced4b748f633136ce530
-
Filesize
102KB
MD521a5b2931807b59be3697687da0a38ae
SHA1728c9dc1346ce133aca16ae888a9672dc1e80aa3
SHA256d926aa32d855e63c0b624666734679ba8df527bcb94f55011f527b1e3b0f6294
SHA512980a92739cf48df6449d5c3ed8b1a526ca4992616fb2b348003f6baf01e3dae75d61323e94cd044fb50310442cd95812279e3a006734020fa7b3eb7b1a12e591
-
Filesize
108KB
MD59cedb135bd9669fc50bf93b65ba79992
SHA1262c0a7030135f7e901c3773fa0ecccc6fe1dd3e
SHA2565e6451589e9b1e84c9e7f4013d039bb15f517d6b0c0ed2492b92c83e41cb7a4a
SHA51222f9c136b6db7f7143872a3cdbb8330324a8d12881286216e1e124ea0cbb63adba72758ca0c09789a42301a3d5c765a8123a342710b5ddebba099a0b22723a1b
-
Filesize
109KB
MD5156a45b408fe3199ff72874dc04ea18d
SHA1bbc8759c852d616d70409ab5e4490d96b45bab12
SHA25679e736e28fece8b97dc077401d69844843db428352fc8fbe0a2fbe46d5e26811
SHA512b5f087bce2dd1a308c9687933bb207b67ff9ca3d7d92ce45572e9c33d6a201837f08c77b777bf6e1e2f3ad5797ae21843d68d71be22b0bce7c0d45fc495b385b
-
Filesize
101KB
MD500d9499e42c93a94925c0399b87d8416
SHA14f82b9e8d5368398e3c83ce7b58b7ea0c7a0d1de
SHA256b142b2dc8099a0ef82a6824e8b7aeadbffa7b7e5f4da95317e7bf67ddbce1e7c
SHA5121552ac09e87b9537c383700da80dd7f1b658fd065cf262cde30964c378d69b2e2b59e931e1fcfa43e4d6e4f54c0384890cc0bb978f9eb9089ab0b399ee3c4e99
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\Downloads\Paul Jay - Global Matters_ The Transnational Turn in Literary Studies-Cornell University Press (2010).pdf
Filesize13.3MB
MD5c795cbae06997524a0376cecb8193601
SHA1d3ae225c42667eccd611820d70c8b4405a8d7af4
SHA256cdafb4eb6149e809f154ea5828d91401b9bce17012c4781da2c8dea02e9f1fb3
SHA512bb4b34a3ef287385e6e5149a3ad901aa5b691e31d62c94bfafd9a9f6a4c69f570f63b8df63da081c09786e261ad23864500b938aae19e0861f3948e8f2bfa0b1
-
Filesize
13.3MB
MD5c795cbae06997524a0376cecb8193601
SHA1d3ae225c42667eccd611820d70c8b4405a8d7af4
SHA256cdafb4eb6149e809f154ea5828d91401b9bce17012c4781da2c8dea02e9f1fb3
SHA512bb4b34a3ef287385e6e5149a3ad901aa5b691e31d62c94bfafd9a9f6a4c69f570f63b8df63da081c09786e261ad23864500b938aae19e0861f3948e8f2bfa0b1