Analysis
-
max time kernel
210s -
max time network
211s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 07:16
Static task
static1
Behavioral task
behavioral1
Sample
test.docx
Resource
win10ltsc2021-20241023-en
General
-
Target
test.docx
-
Size
20KB
-
MD5
b536de7d75b67ba7662278ca04431ab2
-
SHA1
d6ed84e51a50068701a0f26c26c99250801befe0
-
SHA256
66890795aa43d5305905fb7a1dbd43ce6612b092507430a3f2e88cab0ba8fee9
-
SHA512
401d2c22b05033796ff5b8a0ac46aa8140806c0a72f489823e75284ef1591bf3184deb238f38dd7455ef074be15456eab09aaf184d54a0885604c8858cc019be
-
SSDEEP
384:phMDIDDhBhDsdoDsjhLhnFDkfsXyBiiyHlDf2M2hMDIDDhBhDsdoDsjhLhIDFDkI:phMDIDDhBhDsdoDsjhLhnFDkfsXyBiiB
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766471516924680" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3996 WINWORD.EXE 3996 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 1244 MiniSearchHost.exe 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 4836 2084 chrome.exe 83 PID 2084 wrote to memory of 4836 2084 chrome.exe 83 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 3384 2084 chrome.exe 84 PID 2084 wrote to memory of 452 2084 chrome.exe 85 PID 2084 wrote to memory of 452 2084 chrome.exe 85 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 PID 2084 wrote to memory of 2400 2084 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\test.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3996
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96744cc40,0x7ff96744cc4c,0x7ff96744cc582⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3580,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4576,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5072,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4592,i,5168699821970272779,9373711127094218659,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD51039889d003e82bad43408568104f05d
SHA1a8fecf9450e0137b6aa2f74172336c60a819981e
SHA25659e050e4f58802a47a8f31b0eee4e013be703747da28bdc87feea5ec69543afa
SHA51252156ce6b2709b1255759a3ccb26f69166a01c1ba0e6cc4d6bdf06069c402a74f4d4607de3fd444eb127b8d0d6f29d0c493a765f287456df4d5fd788e15c47eb
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
216B
MD5c0984cdbecb811e0c21bcecde5befe4c
SHA15633b3f72ea5d4ac99a515e5821401b2a6cd94ce
SHA2563d4caa39645fcee4faba523362a0ed4f78a60146e4b00976d88b15b92deb3e50
SHA51253273401eccc49163854fb039422e20dd0f2bba3b76c01d0161e7b930464871071e63e99012ae46f0469920f5b602ab0fe586e5b6dc8add60dbf568bcdc8cfd2
-
Filesize
2KB
MD5a1fba03ac0858c416cbef97433889d15
SHA140548e0fc37e66d95e5973c287b3ced61f03a20d
SHA2567cc737a5603ddd016459706763f1a55ee6347c4677d6c4de928e86f285b7ab27
SHA512d77eb6cf53c4d3a90dd41d681c632513c3317e911e94fdf1df7fc81c6dd8369f013aa05ef8e9d003309000d93d6dc4f6d2f732db09c7e8c11cb8eb2fc29107ab
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD52232a203402ce139991eec03be2cb8cb
SHA108ef59ff68528a00e5cc6e9dd775f2784a3d27d5
SHA2568aa8089c7f312cf377ed7bb0c462cc39a9f7836b31d7392710e49eb6c4be4ee8
SHA5129cc136e6273ba0c1a36afb4f5de44727a27c0f637d3bdeab4f417eafa82dae8cd4c897d637834d89bc6bd676c8e24d412f8a7112470ca54966c7bfbf17259b52
-
Filesize
524B
MD52b24849f6fe984ce01771520e870e349
SHA1681965204de6e0884c81937827730c8f402f3445
SHA2565a1221d78fb2394b2ae3aae71ef3c5f30d85872d308060fe24d0363e3d21603f
SHA5123b8ef635eb71213613b0c8bca42044b5457ebc10f7e0b3fc4e1756bff85d05c42ad4230fe33a6def0c498cc67343c73b1537b8ea24758a412341967b3c20e946
-
Filesize
9KB
MD5a0f7cd00ce9800d215f2d1f372debb78
SHA11f6516783a9026b32a4f5e4e16ebe2b120dff562
SHA256ac82bfbad20d97280519082f24d28571f580f9a38bfd815aca29694172da0f50
SHA5123425cdcc2ff5e25eeccb118754ddf7b01556bd20fb7ef14ab2caa192e9e4267775a43a6147b5743b84e45a06cf6124944fc4624b187717b840b4b06d543450c1
-
Filesize
9KB
MD5e3d05e5f1ad33221f8a13de7b4893ac2
SHA1b2a88d97da26e2c8f349918bbde7a13932d393f9
SHA256bb2a2498d9fd0a7490c55cfbf6ed4557aced494a45754041e412b0a9aad18cef
SHA51242a9947722684c542c3e23d0dafd0aaabf020b9c32fb094e1114ecf4ac0ea5c8ab91e883d358db9cbcbec29a53c65bf221906313627cb2bdf80b4d7c153dd0a7
-
Filesize
9KB
MD5fac368c195da7ab7e8f91cbe4a116cec
SHA10cff827c098fbd899063962dfa37f67949bd2eab
SHA2564607c24258266c22c6672e0af600d94c05f6a2a6cdd85fd1a55fd7d45e6d43b4
SHA5127696bcee60602447287efc0c96d3b6962a19c338e7cb91123dd3d0c30f60b8f19e48a05a8b356ad2e93192cccd275b4df0d7dd6abd0ddfbbdcbd02ccbed7a042
-
Filesize
9KB
MD53a3709854783c536870e7909351c4d07
SHA1d8421a49f21b97b26a7a481282728535930b82ba
SHA256260ae14b4dec9c26a627d766cb7b84fee4e1c908a922903745c9275b7d5267b2
SHA5125700801320940fb93f8ac1f2ad2016b7147d41e44a02773810f493236ef207ef4d6ca9abe7563098643c956b9f85c0301e606b089e4074e957ea3b1d64463c74
-
Filesize
9KB
MD5effaa2087d70d7fc4a9b87e4b0b5830d
SHA1717b3e629496e561f5ca3ab38b2a32124e86b414
SHA256d9cd26d0a43c0aa174cb983413e02bd33b593eef5b28d603dee7b95750b8f3dd
SHA5122836e39982123526a86608cf222a6e7cfe0a484d36fd02958f244d18c50c3322ee9f10b0316c940858ee1034937bca65bbd6ff78b8029230a16e7d0efa3d93ec
-
Filesize
9KB
MD56ba7eafd19785740742264ad71d289d0
SHA1f078e9219cac329b52e61e768e9353c0fe3ee6f6
SHA25630bdfac5ed918580cfff55b156d2592cf7b77b68f62b3357eb22fc0fcdb31190
SHA512202772ec665fe1baa98fb46569d6817b807489eefe5967001d8b74fd71927e3f3c612b3445238a2927949cdc6c6f456a5c6452e832d8b2ef2a194cb8ce665cf2
-
Filesize
15KB
MD5071cb6825c463be20797d961f92b92bb
SHA1346d44f39c2a8d85dcca433a0ac95f1d7e5aa918
SHA2567ba9432f70812ce64d515e54dfbde343f5878b98d57522e36ab0a56fdc65ff1e
SHA5120d58b23bc54530275fdd639297356d657e43efdfbac8c8232af8f60d32c740da005feaa7ddd8434f9755354166bf928cce33beca4d954cfbbec897c2159f60e9
-
Filesize
232KB
MD52e5d8b7cfea5efc0941779ebf07c6c67
SHA118490b28a31d152f7437f6fd95d8e0f49e6bbf54
SHA256a6b460d6eb19e29cd3eed53d3603ac8ed120ee502fc3d9ad43f7af96c9bb01d9
SHA51237ff37b6b0a1cd861d420fb315bd980678a0d17f480e1d0b93d599f03283d54e37f8304dcf2365500b566b42cb5a91093e1dba4def774ce360b7eadfbaf293da
-
Filesize
232KB
MD55c861e68378ad399d0410575597bbce9
SHA1c0bbdb9b36aa661522c0db6e55b254024ada49de
SHA256e956b2f8d9722efeaaf6c1099bbf9ee857513e270349effa11c3080c4a489847
SHA512c25d5aab1f298a2fda8742abeee584c858da3344446758a2e39c6aa49768a593a03bcd4a2d55f8f1fe7e1577ee0a7dda78ea39b151550e6b85829a33b8cfaadb
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5d6d3499e5dfe058db4af5745e6885661
SHA1ef47b148302484d5ab98320962d62565f88fcc18
SHA2567ec1b67f891fb646b49853d91170fafc67ff2918befd877dcc8515212be560f6
SHA512ad1646c13f98e6915e51bfba9207b81f6d1d174a1437f9c1e1c935b7676451ff73a694323ff61fa72ec87b7824ce9380423533599e30d889b689e2e13887045f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851223[[fn=iso690]].xsl
Filesize263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84