Analysis
-
max time kernel
156s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe
Resource
win10v2004-20220901-en
General
-
Target
78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe
-
Size
8.6MB
-
MD5
0510e43e930c2aff43c30b42687f41ec
-
SHA1
f52e6919cc866da0a7377a6828027cf29d6ddf54
-
SHA256
78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
-
SHA512
8cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
SSDEEP
98304:WtytNt8tytNtEtytNt4tytNt8tytNtitytNt4tytNt8tytNt:wkvCkvakv2kvCkv0kv2kvCkv
Malware Config
Signatures
-
Executes dropped EXE 18 IoCs
pid Process 1320 notpad.exe 1080 tmp7167871.exe 584 tmp7168682.exe 1560 notpad.exe 900 tmp7169634.exe 1444 tmp7170617.exe 1068 notpad.exe 1176 tmp7171927.exe 624 tmp7199149.exe 1964 notpad.exe 924 tmp7203065.exe 1940 notpad.exe 2000 tmp7237713.exe 1352 tmp7238259.exe 2032 tmp7238820.exe 1032 tmp7240677.exe 588 notpad.exe 380 tmp7240271.exe -
resource yara_rule behavioral1/files/0x000a0000000122f6-55.dat upx behavioral1/files/0x000a0000000122f6-56.dat upx behavioral1/files/0x000a0000000122f6-58.dat upx behavioral1/memory/1320-59-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000a0000000122f6-60.dat upx behavioral1/memory/1320-69-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000b0000000122ef-70.dat upx behavioral1/files/0x000a0000000122f6-74.dat upx behavioral1/files/0x000a0000000122f6-75.dat upx behavioral1/files/0x000a0000000122f6-79.dat upx behavioral1/memory/1560-87-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000b0000000122ef-89.dat upx behavioral1/files/0x000a0000000122f6-96.dat upx behavioral1/files/0x000a0000000122f6-94.dat upx behavioral1/files/0x000a0000000122f6-93.dat upx behavioral1/memory/1068-97-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1068-110-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000b0000000122ef-107.dat upx behavioral1/files/0x000b0000000122f6-111.dat upx behavioral1/files/0x000b0000000122f6-114.dat upx behavioral1/files/0x000b0000000122f6-112.dat upx behavioral1/files/0x000b0000000122f6-115.dat upx behavioral1/memory/1964-116-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1964-117-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000b0000000122ef-123.dat upx behavioral1/files/0x000b0000000122f6-126.dat upx behavioral1/files/0x000b0000000122f6-128.dat upx behavioral1/files/0x000b0000000122f6-130.dat upx behavioral1/files/0x000900000001234f-134.dat upx behavioral1/files/0x000900000001234f-136.dat upx behavioral1/memory/1964-135-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001234f-132.dat upx behavioral1/files/0x000900000001234f-131.dat upx behavioral1/memory/1940-138-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2000-141-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000b0000000122ef-149.dat upx behavioral1/files/0x000b0000000122f6-158.dat upx behavioral1/files/0x000b0000000122f6-157.dat upx behavioral1/memory/588-160-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2000-154-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1940-162-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/380-163-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 32 IoCs
pid Process 2028 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe 2028 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe 1320 notpad.exe 1320 notpad.exe 1320 notpad.exe 1080 tmp7167871.exe 1080 tmp7167871.exe 1560 notpad.exe 1560 notpad.exe 1560 notpad.exe 900 tmp7169634.exe 900 tmp7169634.exe 1068 notpad.exe 1068 notpad.exe 1068 notpad.exe 1176 tmp7171927.exe 1176 tmp7171927.exe 1964 notpad.exe 1964 notpad.exe 924 tmp7203065.exe 924 tmp7203065.exe 1964 notpad.exe 1964 notpad.exe 1940 notpad.exe 1940 notpad.exe 2000 tmp7237713.exe 2000 tmp7237713.exe 2000 tmp7237713.exe 2032 tmp7238820.exe 2032 tmp7238820.exe 1940 notpad.exe 1940 notpad.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File created C:\Windows\SysWOW64\fsb.tmp 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7167871.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7169634.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7169634.exe File created C:\Windows\SysWOW64\notpad.exe tmp7203065.exe File created C:\Windows\SysWOW64\notpad.exe tmp7238820.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7238820.exe File created C:\Windows\SysWOW64\notpad.exe tmp7169634.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7171927.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7171927.exe File created C:\Windows\SysWOW64\notpad.exe tmp7171927.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7203065.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7238820.exe File created C:\Windows\SysWOW64\notpad.exe 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe File created C:\Windows\SysWOW64\notpad.exe- 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7167871.exe File created C:\Windows\SysWOW64\notpad.exe tmp7167871.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7203065.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7167871.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7169634.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7171927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7203065.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7238820.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1320 2028 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe 28 PID 2028 wrote to memory of 1320 2028 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe 28 PID 2028 wrote to memory of 1320 2028 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe 28 PID 2028 wrote to memory of 1320 2028 78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe 28 PID 1320 wrote to memory of 1080 1320 notpad.exe 31 PID 1320 wrote to memory of 1080 1320 notpad.exe 31 PID 1320 wrote to memory of 1080 1320 notpad.exe 31 PID 1320 wrote to memory of 1080 1320 notpad.exe 31 PID 1320 wrote to memory of 584 1320 notpad.exe 29 PID 1320 wrote to memory of 584 1320 notpad.exe 29 PID 1320 wrote to memory of 584 1320 notpad.exe 29 PID 1320 wrote to memory of 584 1320 notpad.exe 29 PID 1080 wrote to memory of 1560 1080 tmp7167871.exe 30 PID 1080 wrote to memory of 1560 1080 tmp7167871.exe 30 PID 1080 wrote to memory of 1560 1080 tmp7167871.exe 30 PID 1080 wrote to memory of 1560 1080 tmp7167871.exe 30 PID 1560 wrote to memory of 900 1560 notpad.exe 32 PID 1560 wrote to memory of 900 1560 notpad.exe 32 PID 1560 wrote to memory of 900 1560 notpad.exe 32 PID 1560 wrote to memory of 900 1560 notpad.exe 32 PID 1560 wrote to memory of 1444 1560 notpad.exe 33 PID 1560 wrote to memory of 1444 1560 notpad.exe 33 PID 1560 wrote to memory of 1444 1560 notpad.exe 33 PID 1560 wrote to memory of 1444 1560 notpad.exe 33 PID 900 wrote to memory of 1068 900 tmp7169634.exe 34 PID 900 wrote to memory of 1068 900 tmp7169634.exe 34 PID 900 wrote to memory of 1068 900 tmp7169634.exe 34 PID 900 wrote to memory of 1068 900 tmp7169634.exe 34 PID 1068 wrote to memory of 1176 1068 notpad.exe 35 PID 1068 wrote to memory of 1176 1068 notpad.exe 35 PID 1068 wrote to memory of 1176 1068 notpad.exe 35 PID 1068 wrote to memory of 1176 1068 notpad.exe 35 PID 1068 wrote to memory of 624 1068 notpad.exe 36 PID 1068 wrote to memory of 624 1068 notpad.exe 36 PID 1068 wrote to memory of 624 1068 notpad.exe 36 PID 1068 wrote to memory of 624 1068 notpad.exe 36 PID 1176 wrote to memory of 1964 1176 tmp7171927.exe 37 PID 1176 wrote to memory of 1964 1176 tmp7171927.exe 37 PID 1176 wrote to memory of 1964 1176 tmp7171927.exe 37 PID 1176 wrote to memory of 1964 1176 tmp7171927.exe 37 PID 1964 wrote to memory of 924 1964 notpad.exe 38 PID 1964 wrote to memory of 924 1964 notpad.exe 38 PID 1964 wrote to memory of 924 1964 notpad.exe 38 PID 1964 wrote to memory of 924 1964 notpad.exe 38 PID 924 wrote to memory of 1940 924 tmp7203065.exe 39 PID 924 wrote to memory of 1940 924 tmp7203065.exe 39 PID 924 wrote to memory of 1940 924 tmp7203065.exe 39 PID 924 wrote to memory of 1940 924 tmp7203065.exe 39 PID 1964 wrote to memory of 2000 1964 notpad.exe 40 PID 1964 wrote to memory of 2000 1964 notpad.exe 40 PID 1964 wrote to memory of 2000 1964 notpad.exe 40 PID 1964 wrote to memory of 2000 1964 notpad.exe 40 PID 1940 wrote to memory of 1352 1940 notpad.exe 41 PID 1940 wrote to memory of 1352 1940 notpad.exe 41 PID 1940 wrote to memory of 1352 1940 notpad.exe 41 PID 1940 wrote to memory of 1352 1940 notpad.exe 41 PID 2000 wrote to memory of 2032 2000 tmp7237713.exe 42 PID 2000 wrote to memory of 2032 2000 tmp7237713.exe 42 PID 2000 wrote to memory of 2032 2000 tmp7237713.exe 42 PID 2000 wrote to memory of 2032 2000 tmp7237713.exe 42 PID 2000 wrote to memory of 1032 2000 tmp7237713.exe 43 PID 2000 wrote to memory of 1032 2000 tmp7237713.exe 43 PID 2000 wrote to memory of 1032 2000 tmp7237713.exe 43 PID 2000 wrote to memory of 1032 2000 tmp7237713.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe"C:\Users\Admin\AppData\Local\Temp\78857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\tmp7168682.exeC:\Users\Admin\AppData\Local\Temp\tmp7168682.exe3⤵
- Executes dropped EXE
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7167871.exeC:\Users\Admin\AppData\Local\Temp\tmp7167871.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1080
-
-
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\tmp7169634.exeC:\Users\Admin\AppData\Local\Temp\tmp7169634.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\tmp7171927.exeC:\Users\Admin\AppData\Local\Temp\tmp7171927.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\tmp7203065.exeC:\Users\Admin\AppData\Local\Temp\tmp7203065.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\tmp7238259.exeC:\Users\Admin\AppData\Local\Temp\tmp7238259.exe8⤵
- Executes dropped EXE
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7240271.exeC:\Users\Admin\AppData\Local\Temp\tmp7240271.exe8⤵
- Executes dropped EXE
PID:380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7237713.exeC:\Users\Admin\AppData\Local\Temp\tmp7237713.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\tmp7238820.exeC:\Users\Admin\AppData\Local\Temp\tmp7238820.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
PID:588
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7240677.exeC:\Users\Admin\AppData\Local\Temp\tmp7240677.exe7⤵
- Executes dropped EXE
PID:1032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7199149.exeC:\Users\Admin\AppData\Local\Temp\tmp7199149.exe4⤵
- Executes dropped EXE
PID:624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7170617.exeC:\Users\Admin\AppData\Local\Temp\tmp7170617.exe2⤵
- Executes dropped EXE
PID:1444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
10KB
MD5280b12e4717c3a7cf2c39561b30bc9e6
SHA18bf777a28c25793357ce8305bf8b01987bc4d9f2
SHA256f6ab4ba25b6075aa5a76d006c434e64cad37fdb2ff242c848c98fad5167a1bfc
SHA512861560b01b9b02fcb80c4e233617d72684c7669e1bce3a234b0fafce733735619e6532fb065ed2d1a4c1249635dca7c75561daaaf92460fad3b8771bb20883b7
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
8.6MB
MD50510e43e930c2aff43c30b42687f41ec
SHA1f52e6919cc866da0a7377a6828027cf29d6ddf54
SHA25678857f29970a349d81e1f9b3c61d85085541f8c431450cfa60c6d9de16fa1da6
SHA5128cd144857ce8574eeec21a716b8c191000780830c8aee7d9cb36026d66a5cf89cd2325da0c2dcd355801b12e87bec0977fcec8e7ac4d7dab714cd7ae4c05d119
-
Filesize
175KB
MD5d378bffb70923139d6a4f546864aa61c
SHA1f00aa51c2ed8b2f656318fdc01ee1cf5441011a4
SHA256c4232ddd4d37b9c0884bd44d8476578c54d7f98d58945728e425736a6a07e102
SHA5127c09ec193d91d3cadb7e58c634b8666d8d6243b3ee7d4d4755eeb82bac62b9508e78aa3c53106bfe72d7a437f650b29a54116663e1b4da11613a30656cccc663
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
8.8MB
MD5ac8b3010142f68f732061bdb974f7f56
SHA128883b0f786e879ed22c236887af79a927219ec9
SHA25656975eb24d4f17d71e1b0340b9284c2ba6c12b4a98c45f6a35bc62b1dd020a38
SHA5129c7eeebed86736cd46be892c81c80382c391bf1852d64cd91ed189453f1bb743abdde2b90cdfde6c84164fafa852bbd76550987357909013e9450f599b681e09
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d
-
Filesize
17.4MB
MD5e84b79475432e9b64f687b0326416154
SHA196b6287395e77725b30c04f7350b5349c5eb58c8
SHA25603abdce845d8f617e64f845528906ded9a0edacb6d5e6fa37af31f012a1788da
SHA5123ddc03c2f94e8f831934f9fc7a845b129f4c43cc1890036141defc85d8e3b33ba19a53b8107a4380849a31eaf44e1a84f25f992590f379f5fb4d11d2a8cccc4d