Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 13:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://samples.vx-underground.org/Samples/Families/RoyalRansomware/5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z
Resource
win10v2004-20240226-en
General
-
Target
https://samples.vx-underground.org/Samples/Families/RoyalRansomware/5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z
Malware Config
Signatures
-
Royal
Royal is a ransomware first seen in 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Royal Ransomware 1 IoCs
resource yara_rule behavioral1/files/0x000900000002320a-183.dat family_royal -
Executes dropped EXE 1 IoCs
pid Process 3344 5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1824 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 2920 msedge.exe 2920 msedge.exe 744 identity_helper.exe 744 identity_helper.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeRestorePrivilege 5504 7zFM.exe Token: 35 5504 7zFM.exe Token: SeSecurityPrivilege 5504 7zFM.exe Token: SeBackupPrivilege 4940 vssvc.exe Token: SeRestorePrivilege 4940 vssvc.exe Token: SeAuditPrivilege 4940 vssvc.exe Token: SeRestorePrivilege 5760 7zG.exe Token: 35 5760 7zG.exe Token: SeSecurityPrivilege 5760 7zG.exe Token: SeSecurityPrivilege 5760 7zG.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 5504 7zFM.exe 2920 msedge.exe 5504 7zFM.exe 5760 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3780 2920 msedge.exe 89 PID 2920 wrote to memory of 3780 2920 msedge.exe 89 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 2428 2920 msedge.exe 90 PID 2920 wrote to memory of 1216 2920 msedge.exe 91 PID 2920 wrote to memory of 1216 2920 msedge.exe 91 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 PID 2920 wrote to memory of 3108 2920 msedge.exe 92 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://samples.vx-underground.org/Samples/Families/RoyalRansomware/5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabd4146f8,0x7ffabd414708,0x7ffabd4147182⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
-
C:\Users\Admin\Desktop\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.exe"C:\Users\Admin\Desktop\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.exe"1⤵
- Executes dropped EXE
PID:3344 -
C:\Windows\System32\vssadmin.exedelete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1824
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\InvokeUpdate\" -ad -an -ai#7zMap13675:82:7zEvent302231⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
194B
MD5c753a51b344f5e0b7614e6b335efce1a
SHA1ecab6c44f7f65a04b594d3c1f5ccc151e1fbbea5
SHA256b9be628c5d1925240917e40326ded59765a86dfc8580b59d2e51f9925f3fc494
SHA512c579bb93537ef2b84bf17b99354eaf60da7719432451d916f15084675ab7fa9c5b24c8e370108b0fec1244d2a8ff44e1ace16fca9abf18c5a12f91f8801a68c5
-
Filesize
6KB
MD59f160db558a41278d8dca940f435534d
SHA14c151d29be208b6920d22b1682a7196388ba1cf7
SHA25612a7851e3f1e879df8b23ee4c1d56b4928a33991cab951abf69a3fcd1bfba986
SHA51224cfde3597f3077939d99fc331c9ba5c61454a5714ef0ad1c8f55ffcbe846406bfa6055266cfc0f0e114f4b921de5dbbbce317f1259c8e3bedc8620b8b4160c3
-
Filesize
6KB
MD5aa322ac651ff02d6ca05b412a44d9961
SHA17972c7a69d0fe23194779468e83d3335ad8fc2e6
SHA256bd5052d021e1a9ac275050ae52185ea99dcbe99a7ea2c1a8a6bbf2a45e5f2bfe
SHA512448b770ff0d28f9d84719cc3e26b8e6ed7e5edc90b81c150c9c0f0612d4c1b5719fc59cd785eb3737f350f858e0620b750e20ff47d9fc02f4c063ea5604ea6d5
-
Filesize
6KB
MD5e01c32c8728412e98a5d5e143fa926b5
SHA197aa5734a2749db939e5f299dc664017626ea9c0
SHA256a2abc96506de1f6f0d0318bb69cbc383c8d3f230d6ed46ea3d7840a70b921817
SHA512a265a28df321f32be49c9f7c8077c4349bdafb444aafb5d4895d486e4e27fb69d39986c1842525f5d0958c0e038f9620c2a1c91548ecc178c41141698c46d9b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5caaa5afdc4dc4aa0c6b3aacb1b5285f9
SHA156198d841770016048c7b97ea47f9affd8cbd9b6
SHA256925b3bffb225e2c693dfe7c0e57b23ed8723dcb14eb96307ab0e47ab7172c31d
SHA512dd99d108190371ecfcd84bf8303a0077faa7271564bfff4caf8be5f5851a46427b447f2b960cd4187d6faa2489e7e8fa04880a038b3cc211878f763b7e24e1de
-
Filesize
11KB
MD545d6008669e79ac6403eef6fe0c22d73
SHA1a408776037a348d5697f0cb0800659f0a58c3ed5
SHA25601be53c0e8c43fba68c6b525e8f98f6d315743a52071954ea7955598ca05ef47
SHA512e5dbf13cc41c88383bec737348f70b2322a536d00637808a607c26b6236df1337f9409ea96f2844874d80181f98007b706bd417d845252d4e6328055bce61ce5
-
Filesize
2.9MB
MD5937d8f5da4adff6309bfa4c3b63a2708
SHA1f697230ba32c437760bf2ac36e6bb33b86684244
SHA2565fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2
SHA512cf14e62fe08f8e3f240f773e91c585805f09a385faabcc040622e02b39501aca9e595d8eda88958430c094429d86446230614f942272c977e450a745e4b04fe1
-
Filesize
1.1MB
MD524a1bc63a8c676077cf5ea00d78bfe68
SHA1a524a3a0952799950045eeaf46ea7c82fde47e8b
SHA25622226007923076d7c685d9d7b071f40363f2b4dd203faaa07dbedd77fb9deab3
SHA51214f0a656e9547132d2f7b9c54bb30a9f8e179c022f461cee9c47d29210577482062893c517b6a408cb1740b6216f70fbe7a9bd153f8eb62d28fd831a7b091080