Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win10v2004-20250314-en
General
-
Target
Quotation.exe
-
Size
1.6MB
-
MD5
d245c0efade78fbe55c9d537732dc8fb
-
SHA1
339657894338cfa9ee994e440443d4fc7ef75368
-
SHA256
860bb4fd3607ebdb177d9732653f9baeff86192cdf7874c5824ab37b9b61013d
-
SHA512
562e31c22abf83d57785a5506025847e18a652765f4086ebc1c199b751eeb184a85e9d0ec08289fea1b6beeda0b94e2195a46702aa643ba4f3558a4023af2268
-
SSDEEP
24576:OkCIwKMTJndSh1pBOjgqDx/u09mNfRWqERWsyI7RHc+Ow57pca5eBZq7W71p0Z3a:OkCzgEHDafT2bW+OwcMeTq72LU
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Quotation.exe -
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/3776-3-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-8-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-19-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-35-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-62-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-61-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-59-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-50-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-47-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-46-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-45-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-44-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-42-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-40-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-37-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-65-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-64-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-36-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-63-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-34-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-60-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-33-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-58-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-32-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-57-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-56-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-31-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-55-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-30-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-54-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-53-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-52-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-29-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-28-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-51-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-49-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-27-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-48-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-26-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-25-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-43-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-24-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-23-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-41-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-39-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-22-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-21-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-38-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-20-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-18-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-17-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-16-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-15-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-14-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-13-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-12-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-10-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-11-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-9-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-6-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 behavioral1/memory/3776-7-0x0000000002960000-0x0000000003960000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 4 IoCs
pid Process 6040 alpha.pif 5716 alpha.pif 2692 Djauszke.PIF 3412 Djauszke.PIF -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts recover.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3776 set thread context of 3368 3776 Quotation.exe 111 PID 3776 set thread context of 1572 3776 Quotation.exe 113 PID 3776 set thread context of 4012 3776 Quotation.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5160 2692 WerFault.exe 118 3288 3412 WerFault.exe 128 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djauszke.PIF Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djauszke.PIF Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3116 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3116 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4012 recover.exe 4012 recover.exe 3368 recover.exe 3368 recover.exe 3368 recover.exe 3368 recover.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3776 Quotation.exe 3776 Quotation.exe 3776 Quotation.exe 3776 Quotation.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4012 recover.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3776 Quotation.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3776 wrote to memory of 3640 3776 Quotation.exe 97 PID 3776 wrote to memory of 3640 3776 Quotation.exe 97 PID 3776 wrote to memory of 3640 3776 Quotation.exe 97 PID 3776 wrote to memory of 2748 3776 Quotation.exe 98 PID 3776 wrote to memory of 2748 3776 Quotation.exe 98 PID 3776 wrote to memory of 2748 3776 Quotation.exe 98 PID 2748 wrote to memory of 3116 2748 cmd.exe 101 PID 2748 wrote to memory of 3116 2748 cmd.exe 101 PID 2748 wrote to memory of 3116 2748 cmd.exe 101 PID 3640 wrote to memory of 2440 3640 cmd.exe 102 PID 3640 wrote to memory of 2440 3640 cmd.exe 102 PID 3640 wrote to memory of 2440 3640 cmd.exe 102 PID 3640 wrote to memory of 6040 3640 cmd.exe 103 PID 3640 wrote to memory of 6040 3640 cmd.exe 103 PID 3640 wrote to memory of 6040 3640 cmd.exe 103 PID 3640 wrote to memory of 5716 3640 cmd.exe 104 PID 3640 wrote to memory of 5716 3640 cmd.exe 104 PID 3640 wrote to memory of 5716 3640 cmd.exe 104 PID 3776 wrote to memory of 4152 3776 Quotation.exe 105 PID 3776 wrote to memory of 4152 3776 Quotation.exe 105 PID 3776 wrote to memory of 4152 3776 Quotation.exe 105 PID 4152 wrote to memory of 1896 4152 cmd.exe 108 PID 4152 wrote to memory of 1896 4152 cmd.exe 108 PID 4152 wrote to memory of 1896 4152 cmd.exe 108 PID 3776 wrote to memory of 3368 3776 Quotation.exe 111 PID 3776 wrote to memory of 3368 3776 Quotation.exe 111 PID 3776 wrote to memory of 3368 3776 Quotation.exe 111 PID 3776 wrote to memory of 3368 3776 Quotation.exe 111 PID 3776 wrote to memory of 412 3776 Quotation.exe 112 PID 3776 wrote to memory of 412 3776 Quotation.exe 112 PID 3776 wrote to memory of 412 3776 Quotation.exe 112 PID 3776 wrote to memory of 1572 3776 Quotation.exe 113 PID 3776 wrote to memory of 1572 3776 Quotation.exe 113 PID 3776 wrote to memory of 1572 3776 Quotation.exe 113 PID 3776 wrote to memory of 1572 3776 Quotation.exe 113 PID 3776 wrote to memory of 4012 3776 Quotation.exe 114 PID 3776 wrote to memory of 4012 3776 Quotation.exe 114 PID 3776 wrote to memory of 4012 3776 Quotation.exe 114 PID 3776 wrote to memory of 4012 3776 Quotation.exe 114 PID 2168 wrote to memory of 2692 2168 rundll32.exe 118 PID 2168 wrote to memory of 2692 2168 rundll32.exe 118 PID 2168 wrote to memory of 2692 2168 rundll32.exe 118 PID 3792 wrote to memory of 3412 3792 rundll32.exe 128 PID 3792 wrote to memory of 3412 3792 rundll32.exe 128 PID 3792 wrote to memory of 3412 3792 rundll32.exe 128 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Quotation.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Quotation.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- UAC bypass
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\\ProgramData\\8559.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:2440
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6040
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\\ProgramData\\37044.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 103⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\\ProgramData\\164.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Djauszke" /tr C:\\ProgramData\\Djauszke.url"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1896
-
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ntnvciq"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ynsfdabnml"2⤵PID:412
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ynsfdabnml"2⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\apgydtmgatxglw"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Windows\System32\ieframe.dll",OpenURL C:\\ProgramData\\Djauszke.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\Links\Djauszke.PIF"C:\Users\Admin\Links\Djauszke.PIF"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 12803⤵
- Program crash
PID:5160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2692 -ip 26921⤵PID:4784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Windows\System32\ieframe.dll",OpenURL C:\\ProgramData\\Djauszke.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\Links\Djauszke.PIF"C:\Users\Admin\Links\Djauszke.PIF"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 12523⤵
- Program crash
PID:3288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3412 -ip 34121⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83B
MD540dcdc4a568ca38fd76ed517d58895dd
SHA1a61427cc65116b4f452c75d8270d5316aa52087f
SHA2565337e647cbe97c1108b0c690bccf5327291051fd0b80a7c51a8f06ca4c32b987
SHA5122e32e0bec4ec95af7f1d5fa7a26e69d00a0d50afedeefeb50a809eb52a44d9c00036ccaaf47773035e21925fcc0425a3726d5676013189d0845a31c93dfa0cb1
-
Filesize
2KB
MD59a020804eba1ffac2928d7c795144bbf
SHA161fdc4135afdc99e106912aeafeac9c8a967becc
SHA256a86c6c7a2bf9e12c45275a5e7ebebd5e6d2ba302fe0a12600b7c9fdf283d9e63
SHA51242f6d754f1bdbeb6e4cc7aeb57ff4c4d126944f950d260a0839911e576ad16002c16122f81c1d39fa529432dca0a48c9acfbb18804ca9044425c8e424a5518be
-
Filesize
19KB
MD51df650cca01129127d30063634ab5c03
SHA1bc7172dec0b12b05f2247bd5e17751eb33474d4e
SHA256edd4094e7a82a6ff8be65d6b075e9513bd15a6b74f8032b5c10ce18f7191fa60
SHA5120bddf9ecaaedb0c30103a1fbfb644d6d4f7608bd596403307ed89b2390568c3a29e2cf55d10e2eadbfc407ede52eaf9a4f2321ba5f37e358a1039f73c7688fbd
-
Filesize
99B
MD592248ee204c5f78679ec8d7548438f69
SHA107c8185a4971582be59173a100debfec4eab6c23
SHA256d9876d9b50df7f1530f176f0ab32ddfdacdb4b6bb2d4ff2d7a696ffea7f5d30b
SHA512537d230229264ef7f71d29517e0940f72fdb9743a102c0697affab5bae8407665325f337dbb444bf81fef35390b2b0afe77dd1c0f84e6fe991935827b9d5d5c6
-
Filesize
144B
MD51f098229d1999e355e91e91aa9afa5e2
SHA15c6486f7927453ccc223e64248786339e6690a2f
SHA256e2302eb97c86ff656fb2d2d5d03d035595f811accc357927492e76d7405a5474
SHA512bcb8aa88c19c10a30b00613bcdd9b14714f7eb12784af58e4c65fb46eefd87dfcc6f4f5a1965da965b0de61c9f74d350738cba758ca2cca292834e8f310f231b
-
Filesize
4KB
MD505a640e15ef8a6cd5d8db4633bfd2df3
SHA123771918cb286dd2ca98c0cc1664931e64cc33c8
SHA2565b8be3e1fe8438ab1032b5914b5f5b8f544defc91213c6ef3f307b44d2a1951c
SHA51227d198ecea0bbc12a48ce27c8dbd8a9a445248956623cefd501562cf00162a662e40f020a7276f1f870f324617f419342de9384b71664eea4778866b8bcfd616
-
Filesize
1.6MB
MD5d245c0efade78fbe55c9d537732dc8fb
SHA1339657894338cfa9ee994e440443d4fc7ef75368
SHA256860bb4fd3607ebdb177d9732653f9baeff86192cdf7874c5824ab37b9b61013d
SHA512562e31c22abf83d57785a5506025847e18a652765f4086ebc1c199b751eeb184a85e9d0ec08289fea1b6beeda0b94e2195a46702aa643ba4f3558a4023af2268
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2