Analysis
-
max time kernel
97s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/03/2023, 10:42
Behavioral task
behavioral1
Sample
LeonTap2-3-1.exe
Resource
win7-20230220-en
General
-
Target
LeonTap2-3-1.exe
-
Size
935KB
-
MD5
5791584fc3bfb6898050e73eb2bf984a
-
SHA1
4061fb087856ce6006f33d18b3cabd5cac27751b
-
SHA256
eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
-
SHA512
db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
SSDEEP
24576:o7x4MROxnFE3bO3errcI0AilFEvxHPJooK:oyMiuoerrcI0AilFEvxHP
Malware Config
Extracted
orcus
LeonTap
192.168.0.105:6969
42367967463b479388163871ade6a80d
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\LeonTap2-3-1-4\LeonTap2-3-1.exe
-
reconnect_delay
10000
-
registry_keyname
LeonTap
-
taskscheduler_taskname
LeonTap
-
watchdog_path
AppData\LeonTap2-3.1.4.exe
Signatures
-
Orcus main payload 5 IoCs
resource yara_rule behavioral1/files/0x000600000001413d-80.dat family_orcus behavioral1/files/0x000600000001413d-83.dat family_orcus behavioral1/files/0x000600000001413d-82.dat family_orcus behavioral1/files/0x000600000001413d-85.dat family_orcus behavioral1/files/0x000600000001413d-106.dat family_orcus -
Orcurs Rat Executable 8 IoCs
resource yara_rule behavioral1/memory/2032-54-0x0000000001380000-0x0000000001470000-memory.dmp orcus behavioral1/files/0x000600000001413d-80.dat orcus behavioral1/files/0x000600000001413d-83.dat orcus behavioral1/files/0x000600000001413d-82.dat orcus behavioral1/files/0x000600000001413d-85.dat orcus behavioral1/memory/1156-86-0x00000000013C0000-0x00000000014B0000-memory.dmp orcus behavioral1/memory/2008-88-0x0000000019560000-0x00000000195E0000-memory.dmp orcus behavioral1/files/0x000600000001413d-106.dat orcus -
Executes dropped EXE 7 IoCs
pid Process 112 WindowsInput.exe 2008 WindowsInput.exe 1156 LeonTap2-3-1.exe 796 LeonTap2-3.1.4.exe 1688 LeonTap2-3.1.4.exe 1540 LeonTap2-3-1.exe 2016 WindowsInput.exe -
Loads dropped DLL 3 IoCs
pid Process 2032 LeonTap2-3-1.exe 2032 LeonTap2-3-1.exe 1156 LeonTap2-3-1.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe LeonTap2-3-1.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config LeonTap2-3-1.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe LeonTap2-3-1.exe File opened for modification C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe LeonTap2-3-1.exe File created C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe.config LeonTap2-3-1.exe File opened for modification C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe LeonTap2-3-1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1720 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1156 LeonTap2-3-1.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe 1156 LeonTap2-3-1.exe 1688 LeonTap2-3.1.4.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1156 LeonTap2-3-1.exe Token: SeDebugPrivilege 796 LeonTap2-3.1.4.exe Token: SeDebugPrivilege 1688 LeonTap2-3.1.4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1156 LeonTap2-3-1.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1156 LeonTap2-3-1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1156 LeonTap2-3-1.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2032 wrote to memory of 112 2032 LeonTap2-3-1.exe 29 PID 2032 wrote to memory of 112 2032 LeonTap2-3-1.exe 29 PID 2032 wrote to memory of 112 2032 LeonTap2-3-1.exe 29 PID 2032 wrote to memory of 112 2032 LeonTap2-3-1.exe 29 PID 2032 wrote to memory of 1156 2032 LeonTap2-3-1.exe 31 PID 2032 wrote to memory of 1156 2032 LeonTap2-3-1.exe 31 PID 2032 wrote to memory of 1156 2032 LeonTap2-3-1.exe 31 PID 2032 wrote to memory of 1156 2032 LeonTap2-3-1.exe 31 PID 1156 wrote to memory of 796 1156 LeonTap2-3-1.exe 33 PID 1156 wrote to memory of 796 1156 LeonTap2-3-1.exe 33 PID 1156 wrote to memory of 796 1156 LeonTap2-3-1.exe 33 PID 1156 wrote to memory of 796 1156 LeonTap2-3-1.exe 33 PID 796 wrote to memory of 1688 796 LeonTap2-3.1.4.exe 34 PID 796 wrote to memory of 1688 796 LeonTap2-3.1.4.exe 34 PID 796 wrote to memory of 1688 796 LeonTap2-3.1.4.exe 34 PID 796 wrote to memory of 1688 796 LeonTap2-3.1.4.exe 34 PID 1692 wrote to memory of 1540 1692 taskeng.exe 35 PID 1692 wrote to memory of 1540 1692 taskeng.exe 35 PID 1692 wrote to memory of 1540 1692 taskeng.exe 35 PID 1692 wrote to memory of 1540 1692 taskeng.exe 35 PID 1156 wrote to memory of 2016 1156 LeonTap2-3-1.exe 36 PID 1156 wrote to memory of 2016 1156 LeonTap2-3-1.exe 36 PID 1156 wrote to memory of 2016 1156 LeonTap2-3-1.exe 36 PID 1156 wrote to memory of 2016 1156 LeonTap2-3-1.exe 36 PID 1156 wrote to memory of 840 1156 LeonTap2-3-1.exe 37 PID 1156 wrote to memory of 840 1156 LeonTap2-3-1.exe 37 PID 1156 wrote to memory of 840 1156 LeonTap2-3-1.exe 37 PID 1156 wrote to memory of 840 1156 LeonTap2-3-1.exe 37 PID 840 wrote to memory of 1720 840 cmd.exe 39 PID 840 wrote to memory of 1720 840 cmd.exe 39 PID 840 wrote to memory of 1720 840 cmd.exe 39 PID 840 wrote to memory of 1720 840 cmd.exe 39 PID 840 wrote to memory of 1500 840 cmd.exe 40 PID 840 wrote to memory of 1500 840 cmd.exe 40 PID 840 wrote to memory of 1500 840 cmd.exe 40 PID 840 wrote to memory of 1500 840 cmd.exe 40 PID 840 wrote to memory of 464 840 cmd.exe 41 PID 840 wrote to memory of 464 840 cmd.exe 41 PID 840 wrote to memory of 464 840 cmd.exe 41 PID 840 wrote to memory of 464 840 cmd.exe 41 PID 840 wrote to memory of 924 840 cmd.exe 42 PID 840 wrote to memory of 924 840 cmd.exe 42 PID 840 wrote to memory of 924 840 cmd.exe 42 PID 840 wrote to memory of 924 840 cmd.exe 42 PID 840 wrote to memory of 944 840 cmd.exe 43 PID 840 wrote to memory of 944 840 cmd.exe 43 PID 840 wrote to memory of 944 840 cmd.exe 43 PID 840 wrote to memory of 944 840 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\LeonTap2-3-1.exe"C:\Users\Admin\AppData\Local\Temp\LeonTap2-3-1.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:112
-
-
C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe"C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe" /launchSelfAndExit "C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe" 1156 /protectFile3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe"C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe" /watchProcess "C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe" 1156 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --uninstall3⤵
- Executes dropped EXE
PID:2016
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\{acb7c3c5-0ce0-4ebe-8795-d7a979cabed1}.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo j "4⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe""4⤵PID:464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo j "4⤵PID:924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del C:\Users\Admin\AppData\Local\Temp\{acb7c3c5-0ce0-4ebe-8795-d7a979cabed1}.bat"4⤵PID:944
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:2008
-
C:\Windows\system32\taskeng.exetaskeng.exe {6C5A4C3F-BDC4-4503-8064-5D4F4409AC13} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"2⤵
- Executes dropped EXE
PID:1540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
193B
MD5305190402b56afb8d949cc7de56e9b7d
SHA16dfe0fd4d165dc14577fe9d5e457423c555eac53
SHA25613e9dfc8aeac38c6efee519193ec81e758db3ec5d3e9d37485a7f5319ab178e3
SHA51230fc96ee0ee1ab56c724e55a252fe72fbd8eaa16610546683d645ff97651efe185feeb8a084ec197d9a56ffe65d20c573522af82b199305b4797eecd1b4f26a2
-
Filesize
193B
MD5305190402b56afb8d949cc7de56e9b7d
SHA16dfe0fd4d165dc14577fe9d5e457423c555eac53
SHA25613e9dfc8aeac38c6efee519193ec81e758db3ec5d3e9d37485a7f5319ab178e3
SHA51230fc96ee0ee1ab56c724e55a252fe72fbd8eaa16610546683d645ff97651efe185feeb8a084ec197d9a56ffe65d20c573522af82b199305b4797eecd1b4f26a2
-
Filesize
1KB
MD504d42eefa7b3b5f0f56d1d2f35c123a3
SHA151ee7c741dd04e18d60a1199520a664da7f8a3ad
SHA256cbe3276dcbd0cf1bee2265306467d196d54dfad3d9ae17632d694420517ec003
SHA5124561ee9a1af3690293e59a4dde2b8b38450c3ce89816f274684bfeae67a48bd73c0345e6a73547f2fcacb8737a980fd5a77b475eeccbf643e3c60f8160175a7c
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
7KB
MD5362ce475f5d1e84641bad999c16727a0
SHA16b613c73acb58d259c6379bd820cca6f785cc812
SHA2561f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899
SHA5127630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e