Analysis
-
max time kernel
70s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2023 03:54
Static task
static1
Behavioral task
behavioral1
Sample
Install VALORANT.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Install VALORANT.exe
Resource
win10v2004-20220812-en
General
-
Target
Install VALORANT.exe
-
Size
66.0MB
-
MD5
70d1d4812e3db6bbffc68bf10ad804b5
-
SHA1
624f3cb87e84b3ff40160803abe5dd0eb1a61378
-
SHA256
cdd1c45b13f7b59558919f2087737b1aeb7f74cddfd689926fffa405ca0961ac
-
SHA512
d18ddb0288c121d17617ca77ece5ea62b2353c469fdc746b0e028ca810353e3689c06ce786cc7cb958a085b95b81d7bf945c6425cf4bc26afac8491d25f1d6c1
-
SSDEEP
1572864:MuK0ySSp8K0UNl/Ywrt9E7lzPF5KBBhDIVIbjUp1xD:BEp8KnAtqBBhDIVNj
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 5092 RiotClientServices.exe 2236 RiotClientServices.exe 2484 RiotClientServices.exe 3516 RiotClientCrashHandler.exe 4032 RiotClientUx.exe 1652 RiotClientServices.exe 4864 RiotClientCrashHandler.exe 440 RiotClientUxRender.exe 796 RiotClientUxRender.exe -
Loads dropped DLL 15 IoCs
pid Process 2236 RiotClientServices.exe 2236 RiotClientServices.exe 2236 RiotClientServices.exe 4032 RiotClientUx.exe 4032 RiotClientUx.exe 4032 RiotClientUx.exe 440 RiotClientUxRender.exe 440 RiotClientUxRender.exe 440 RiotClientUxRender.exe 440 RiotClientUxRender.exe 440 RiotClientUxRender.exe 440 RiotClientUxRender.exe 796 RiotClientUxRender.exe 796 RiotClientUxRender.exe 796 RiotClientUxRender.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\shell Install VALORANT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\shell\open\command\ = "\"C:\\Riot Games\\Riot Client\\RiotClientServices.exe\" --app-command=\"%1\"" Install VALORANT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{05516190-a2c3-4596-9505-66d0e7913e44} RiotClientServices.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\DefaultIcon Install VALORANT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\DefaultIcon\ = "\"C:\\Riot Games\\Riot Client\\RiotClientServices.exe\",0" Install VALORANT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{05516190-a2c3-4596-9505-66d0e7913e44}\LocalServer32\ = "\"C:/Riot Games/Riot Client/RiotClientServices.exe\" --launch-background-mode" RiotClientServices.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{05516190-a2c3-4596-9505-66d0e7913e44}\ = "ExtServer" RiotClientServices.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\URL Protocol Install VALORANT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\shell\open\command Install VALORANT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{05516190-a2c3-4596-9505-66d0e7913e44}\AppId = "{05516190-a2c3-4596-9505-66d0e7913e44}" RiotClientServices.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{05516190-a2c3-4596-9505-66d0e7913e44}\LocalServer32 RiotClientServices.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{05516190-a2c3-4596-9505-66d0e7913e44} RiotClientServices.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{05516190-a2c3-4596-9505-66d0e7913e44}\RunAs = "Interactive User" RiotClientServices.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\ = "URL:Riot Games Protocol" Install VALORANT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient\shell\open Install VALORANT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{05516190-a2c3-4596-9505-66d0e7913e44}\AppIdFlags = "8" RiotClientServices.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{05516190-a2c3-4596-9505-66d0e7913e44}\LaunchPermission = 0100148094000000a0000000140000003000000002001c000100000011001400040000000101000000000010001000000200640003000000000014000b000000010100000000000100000000000018000b000000010200000000000f0200000001000000000030000b000000010800000000000f0200000076c8b566b196b8807bdf0386522d4758fa9855746bd04da4099286d401010000000000050a00000001020000000000052000000021020000 RiotClientServices.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{05516190-a2c3-4596-9505-66d0e7913e44}\AccessPermission = 0100148094000000a0000000140000003000000002001c000100000011001400040000000101000000000010001000000200640003000000000014000b000000010100000000000100000000000018000b000000010200000000000f0200000001000000000030000b000000010800000000000f0200000076c8b566b196b8807bdf0386522d4758fa9855746bd04da4099286d401010000000000050a00000001020000000000052000000021020000 RiotClientServices.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{3176ED1B-F327-48C9-815D-6680218B5491} RiotClientUxRender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\riotclient Install VALORANT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{05516190-a2c3-4596-9505-66d0e7913e44}\ = "ExtServer" RiotClientServices.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2236 RiotClientServices.exe 2236 RiotClientServices.exe 2236 RiotClientServices.exe 2236 RiotClientServices.exe 440 RiotClientUxRender.exe 440 RiotClientUxRender.exe 796 RiotClientUxRender.exe 796 RiotClientUxRender.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4032 RiotClientUx.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4824 Install VALORANT.exe Token: SeIncBasePriorityPrivilege 3068 Install VALORANT.exe Token: SeIncBasePriorityPrivilege 5092 RiotClientServices.exe Token: SeIncBasePriorityPrivilege 2236 RiotClientServices.exe Token: SeIncBasePriorityPrivilege 2484 RiotClientServices.exe Token: SeIncBasePriorityPrivilege 2236 RiotClientServices.exe Token: SeIncBasePriorityPrivilege 2236 RiotClientServices.exe Token: SeIncBasePriorityPrivilege 1652 RiotClientServices.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 RiotClientServices.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2236 RiotClientServices.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4032 RiotClientUx.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3068 4824 Install VALORANT.exe 80 PID 4824 wrote to memory of 3068 4824 Install VALORANT.exe 80 PID 4824 wrote to memory of 3068 4824 Install VALORANT.exe 80 PID 3068 wrote to memory of 5092 3068 Install VALORANT.exe 84 PID 3068 wrote to memory of 5092 3068 Install VALORANT.exe 84 PID 3068 wrote to memory of 5092 3068 Install VALORANT.exe 84 PID 4824 wrote to memory of 2236 4824 Install VALORANT.exe 85 PID 4824 wrote to memory of 2236 4824 Install VALORANT.exe 85 PID 4824 wrote to memory of 2236 4824 Install VALORANT.exe 85 PID 2236 wrote to memory of 2484 2236 RiotClientServices.exe 87 PID 2236 wrote to memory of 2484 2236 RiotClientServices.exe 87 PID 2236 wrote to memory of 2484 2236 RiotClientServices.exe 87 PID 2236 wrote to memory of 3516 2236 RiotClientServices.exe 88 PID 2236 wrote to memory of 3516 2236 RiotClientServices.exe 88 PID 2236 wrote to memory of 3516 2236 RiotClientServices.exe 88 PID 2236 wrote to memory of 1652 2236 RiotClientServices.exe 97 PID 2236 wrote to memory of 1652 2236 RiotClientServices.exe 97 PID 2236 wrote to memory of 1652 2236 RiotClientServices.exe 97 PID 4032 wrote to memory of 4864 4032 RiotClientUx.exe 98 PID 4032 wrote to memory of 4864 4032 RiotClientUx.exe 98 PID 4032 wrote to memory of 4864 4032 RiotClientUx.exe 98 PID 4032 wrote to memory of 440 4032 RiotClientUx.exe 100 PID 4032 wrote to memory of 440 4032 RiotClientUx.exe 100 PID 4032 wrote to memory of 440 4032 RiotClientUx.exe 100 PID 4032 wrote to memory of 796 4032 RiotClientUx.exe 103 PID 4032 wrote to memory of 796 4032 RiotClientUx.exe 103 PID 4032 wrote to memory of 796 4032 RiotClientUx.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install VALORANT.exe"C:\Users\Admin\AppData\Local\Temp\Install VALORANT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\Install VALORANT.exe"C:\Users\Admin\AppData\Local\Temp\Install VALORANT.exe" --agent --riotclient-app-port=49738 --riotclient-auth-token=aj58L9y0p3ZeyRmc7lydZA --app-root=C:/Users/Admin/AppData/Local/Temp "--data-root=C:/ProgramData/Riot Games/Metadata" "--update-root=C:/ProgramData/Riot Games/Metadata/Install VALORANT/Update" "--log-root=C:/Users/Admin/AppData/Local/Riot Games/Install VALORANT/Logs" "--user-data-root=C:/Users/Admin/AppData/Local/Riot Games/Install VALORANT" --session-id=1179da92-7c7c-d244-b2ca-c25f010aa5862⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Riot Games\Riot Client\RiotClientServices.exe"C:/Riot Games/Riot Client/RiotClientServices.exe" --agent --agent-bootstrap --riotclient-app-port=49749 --riotclient-auth-token=hjMrShuDcOKQDlLUH5jT9Q --app-root=C:/Users/Admin/AppData/Local/Temp "--data-root=C:/ProgramData/Riot Games/Metadata" "--update-root=C:/ProgramData/Riot Games/Metadata/Install VALORANT/Update" "--log-root=C:/Users/Admin/AppData/Local/Riot Games/Install VALORANT/Logs" "--user-data-root=C:/Users/Admin/AppData/Local/Riot Games/Install VALORANT"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
-
C:\Riot Games\Riot Client\RiotClientServices.exe"C:/Riot Games/Riot Client/RiotClientServices.exe" --launch-product=valorant --launch-patchline=live --force-auto-patch --shard=valorant:live:latam --locale=en_US --session-id=1179da92-7c7c-d244-b2ca-c25f010aa586 --install-flow --agent-pid=5092 --agent-port=49803 --agent-auth-token=1y0M0swVtBjdI32GGHh-ZA2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Riot Games\Riot Client\RiotClientServices.exe"C:\Riot Games\Riot Client\RiotClientServices.exe" --agent --riotclient-app-port=49828 --riotclient-auth-token=WOq3SpVVu0waipQyIC115A "--app-root=C:/Riot Games/Riot Client" "--data-root=C:/ProgramData/Riot Games/Metadata" "--update-root=C:/ProgramData/Riot Games/Metadata/Riot Client/Update" "--log-root=C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs" "--user-data-root=C:/Users/Admin/AppData/Local/Riot Games/Riot Client" --session-id=1179da92-7c7c-d244-b2ca-c25f010aa5863⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Riot Games\Riot Client\RiotClientCrashHandler.exe"C:\Riot Games\Riot Client\RiotClientCrashHandler.exe" --no-rate-limit "--attachment=2023-01-02T04-56-08_2236_Riot_Client.0.log=C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client Logs/2023-01-02T04-56-08_2236_Riot Client.0.log" "--attachment=2023-01-02T04-56-08_2236_Riot_Client.log=C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client Logs/2023-01-02T04-56-08_2236_Riot Client.log" "--attachment=__sentry-breadcrumb1=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\Riot Client\87883ee5-ef4a-4608-4735-66cbf8db6928.run\__sentry-breadcrumb1" "--attachment=__sentry-breadcrumb2=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\Riot Client\87883ee5-ef4a-4608-4735-66cbf8db6928.run\__sentry-breadcrumb2" "--attachment=__sentry-event=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\Riot Client\87883ee5-ef4a-4608-4735-66cbf8db6928.run\__sentry-event" "--database=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\Riot Client" "--metrics-dir=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\Riot Client" --url=https://sentry.io:443/api/1339107/minidump/?sentry_key=dc54709324504ab18ddf517a83f99e1a --initial-client-data=0x3f8,0x3fc,0x310,0x39c,0x360,0x74350db8,0x74350dc8,0x74350dd83⤵
- Executes dropped EXE
PID:3516
-
-
C:\Riot Games\Riot Client\UX\RiotClientUx.exe"C:/Riot Games/Riot Client/UX/RiotClientUx.exe" --app-port=49917 --remoting-auth-token=wit3CKCPFQan50q5pXWg-g --app-pid=2236 "--log-dir=C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs" "--user-data-root=C:/Users/Admin/AppData/Local/Riot Games/Riot Client" "--app-root=C:/Riot Games/Riot Client" --crashpad-environment=KeystoneFoundationLiveWin3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Riot Games\Riot Client\RiotClientCrashHandler.exe"C:\Riot Games\Riot Client\RiotClientCrashHandler.exe" --no-rate-limit "--attachment=2023-01-02T04-56-18_4032_RiotClientUx.0.log=C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/2023-01-02T04-56-18_4032_RiotClientUx.0.log" "--attachment=2023-01-02T04-56-18_4032_RiotClientUx.log=C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/2023-01-02T04-56-18_4032_RiotClientUx.log" "--attachment=__sentry-breadcrumb1=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\RiotClientUx\79514e3f-43e2-4735-68b1-ae3f34d97bbb.run\__sentry-breadcrumb1" "--attachment=__sentry-breadcrumb2=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\RiotClientUx\79514e3f-43e2-4735-68b1-ae3f34d97bbb.run\__sentry-breadcrumb2" "--attachment=__sentry-event=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\RiotClientUx\79514e3f-43e2-4735-68b1-ae3f34d97bbb.run\__sentry-event" "--database=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\RiotClientUx" "--metrics-dir=C:\Users\Admin\AppData\Local\Riot Games\Riot Client\Crashes\RiotClientUx" --url=https://sentry.io:443/api/1339107/minidump/?sentry_key=dc54709324504ab18ddf517a83f99e1a --initial-client-data=0x358,0x35c,0x360,0x334,0x364,0xc8e0a8,0xc8e0b8,0xc8e0c84⤵
- Executes dropped EXE
PID:4864
-
-
C:\Riot Games\Riot Client\UX\RiotClientUxRender.exe"C:\Riot Games\Riot Client\UX\RiotClientUxRender.exe" --type=gpu-process --field-trial-handle=1476,6849663102929276223,4404010654384707868,131072 --disable-features=HardwareMediaKeyHandling,NetworkService --no-sandbox --log-file="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/debug.log" --product-version="RiotClient/62.0.1 (CEF 74)" --lang=en-US --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --log-file="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/debug.log" --service-request-channel-token=14122417649648337345 --mojo-platform-channel-handle=1480 /prefetch:2 --app-name=RiotClient --ux-name=RiotClientUx --ux-helper-name=RiotClientUxHelper --log-dir="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/" --app-port=49917 --crashpad-environment=KeystoneFoundationLiveWin --user-data-root="C:/Users/Admin/AppData/Local/Riot Games/Riot Client" --app-root="C:/Riot Games/Riot Client"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Riot Games\Riot Client\UX\RiotClientUxRender.exe"C:\Riot Games\Riot Client\UX\RiotClientUxRender.exe" --type=renderer --no-sandbox --autoplay-policy=no-user-gesture-required --enable-experimental-web-platform-features --force-device-scale-factor=1 --log-file="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/debug.log" --field-trial-handle=1476,6849663102929276223,4404010654384707868,131072 --disable-features=HardwareMediaKeyHandling,NetworkService --lang=en-US --log-file="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/debug.log" --product-version="RiotClient/62.0.1 (CEF 74)" --disable-extensions --disable-spell-checking --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=3320976307126041042 --renderer-client-id=3 --mojo-platform-channel-handle=2332 /prefetch:1 --app-name=RiotClient --ux-name=RiotClientUx --ux-helper-name=RiotClientUxHelper --log-dir="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/" --app-port=49917 --crashpad-environment=KeystoneFoundationLiveWin --user-data-root="C:/Users/Admin/AppData/Local/Riot Games/Riot Client" --app-root="C:/Riot Games/Riot Client"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:796
-
-
C:\Riot Games\Riot Client\UX\RiotClientUxRender.exe"C:\Riot Games\Riot Client\UX\RiotClientUxRender.exe" --type=gpu-process --field-trial-handle=1476,6849663102929276223,4404010654384707868,131072 --disable-features=HardwareMediaKeyHandling,NetworkService --disable-gpu-sandbox --use-gl=disabled --no-sandbox --log-file="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/debug.log" --product-version="RiotClient/62.0.1 (CEF 74)" --lang=en-US --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --log-file="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/debug.log" --service-request-channel-token=11407531986982081606 --mojo-platform-channel-handle=3748 /prefetch:2 --app-name=RiotClient --ux-name=RiotClientUx --ux-helper-name=RiotClientUxHelper --log-dir="C:/Users/Admin/AppData/Local/Riot Games/Riot Client/Logs/Riot Client UX Logs/" --app-port=49917 --crashpad-environment=KeystoneFoundationLiveWin --user-data-root="C:/Users/Admin/AppData/Local/Riot Games/Riot Client" --app-root="C:/Riot Games/Riot Client"4⤵PID:1304
-
-
-
C:\Riot Games\Riot Client\RiotClientServices.exe"C:\Riot Games\Riot Client\RiotClientServices.exe" --agent --riotclient-app-port=49917 --riotclient-auth-token=BRU3h1pY_utdiq9s96hj2A3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD501fc6fa6d66e084ea27bc06a1b10e551
SHA15cbc796c05fcfbf95a153e0b649be43b4d592537
SHA256fda5c5755f67e252bb5c7cf263634b2db22f06e1c45a200cc79eda5846738eab
SHA5126b2fc77ad492804d2b4d0757eeb9dc233527e62bef292d7182a004b187aab51b29e128088916a22d7fed80a85de1c5ac124fcb6229b4cee1410853e53cef2478
-
Filesize
97B
MD5575f7c3fbc92cfde5a6dbe215e27678a
SHA1ea074a4e5bbf56f780caff4400be36aacc0de8b0
SHA25641cbaa93d820233d7f5ddd59c227131ff7f68ca7a11c830a61d98f3fb3c4aa9e
SHA5127a62f3a224af81f263b9534f7605592bfdf3e4a795dd2ee7c002ee1929f95fe54c288e0439a39b48165c79235468c478e18a3713232da8f7c0187243f13148bf
-
Filesize
39B
MD5fe60dfbc6037e1504da40115518f3bda
SHA13df96f91c2cc6832de711b6315981d9eb9823b43
SHA25644f7d5e95676b6e0e0311a1f926f3b80c36fa078eae9b1a2e1c1afb57caecd1c
SHA5127906b58613dd89a055bf611716bcf8304dc2843db0da01208e4e553bedaa675cc95050dfcb5f7604cbfb42756e9e2adf39905c94ed04d342f4e3db9620bf2f79
-
Filesize
10KB
MD5d6abf638473c8fa2b7f88961d5402fcf
SHA19d0ad43bcffd5ebfccdbf3115cae2c2b3b00a472
SHA256000d645a07789c850a7b4cb63a864cede47f9de81adc8534ec1feca3807843c0
SHA512ca18590adbc971ec169a0d7569daa69fc623d5254612645317857d57b6de663d023e6d3e483e40027c74ee0004c5cd5a5acbb49db563e6b6e5b3cd9b9131342d
-
Filesize
278KB
MD56d64639ab95a44fa7967e6a5c481662b
SHA134f2ad2bff7a2924e4f48cf3fa9e3ece468fda18
SHA256ed7c539dd00734fb54c3504fc01123596f5aa3031dc0eca5160cef34de5cac5b
SHA512a5dc9e5208e9dba9f1815676f404dbbc8923401cbdbc1765c0f76447ffb723c1864b70f79909c14b9a025889b6a59e2081d9a75de1b3164a2789da9ed967605d
-
Filesize
1.9MB
MD5e9022af4e5cf995c2f2a9d897af560e9
SHA1f6a0e432af5a1f87492d936afcadc0fb671b3da2
SHA25676d2ad3dfa217321475a92b2f7ddf497d69e3c8537b216f83e512e4fa91c332f
SHA5124c48a505f1d37b319ffdafafef4ca4ac7eab103d32088c3c1dad40b37036f9b73c454d030a3a15c4bbbe4935b583f162434eb6952bee35f3442d471b45932278
-
Filesize
9.8MB
MD5f1698ba7d7f63fac1a8fdb78d20c68dd
SHA1a95b1f59ddd447df1c660c9510275d9ca4f5b3d8
SHA256584e8c618e1b3b255847c39cce3051e3c4c5eedb76a0d3861b33e6ab56b7c27e
SHA512c902931762b5aa91d40c97cb6aa623b50eaf253281764163ace47d424e33bc0155cab4534a54e7e7adaddb514130b63695cf232c0c94a94a955d9a369457bd38
-
Filesize
66.5MB
MD5be96e36b038efff397958a0877f06185
SHA1cacfc58f9510b821ccf97c8bfc23da786041bac9
SHA25668db34e4450aeac83973e0c36d5479bb4a7e4071fa17f55e44f48a5d194db961
SHA5126f208bab44a7f99d6ce13f10865ccdedf772ff6a1f22ee921d294b26c0d8827d6af916a2f0047fb3e5bf6e908516f5f5b7bfd851738f347d143bf5ff89d22b84
-
Filesize
66.5MB
MD5be96e36b038efff397958a0877f06185
SHA1cacfc58f9510b821ccf97c8bfc23da786041bac9
SHA25668db34e4450aeac83973e0c36d5479bb4a7e4071fa17f55e44f48a5d194db961
SHA5126f208bab44a7f99d6ce13f10865ccdedf772ff6a1f22ee921d294b26c0d8827d6af916a2f0047fb3e5bf6e908516f5f5b7bfd851738f347d143bf5ff89d22b84
-
Filesize
66.5MB
MD5be96e36b038efff397958a0877f06185
SHA1cacfc58f9510b821ccf97c8bfc23da786041bac9
SHA25668db34e4450aeac83973e0c36d5479bb4a7e4071fa17f55e44f48a5d194db961
SHA5126f208bab44a7f99d6ce13f10865ccdedf772ff6a1f22ee921d294b26c0d8827d6af916a2f0047fb3e5bf6e908516f5f5b7bfd851738f347d143bf5ff89d22b84
-
Filesize
66.5MB
MD5be96e36b038efff397958a0877f06185
SHA1cacfc58f9510b821ccf97c8bfc23da786041bac9
SHA25668db34e4450aeac83973e0c36d5479bb4a7e4071fa17f55e44f48a5d194db961
SHA5126f208bab44a7f99d6ce13f10865ccdedf772ff6a1f22ee921d294b26c0d8827d6af916a2f0047fb3e5bf6e908516f5f5b7bfd851738f347d143bf5ff89d22b84
-
Filesize
30.8MB
MD52fffb2d7b044bb165b7f87dd27d9e969
SHA1c741871bac89b8d26e6c652df77b40e5a2b3dcaa
SHA256d9a69c5e56af6eb854e30cebdbd017d9c2565ae652faeda12d2ffbde824c7102
SHA512170ec853afc7299750cc215ab9a4f09841d6f738853a6fbf88a731da6878e3fe301805eb81d363924e992cf4515c2e6cbf1e617563f86a237f49dbe004e2f0a6
-
Filesize
3.5MB
MD552f3fc9f9b84e341e57c4bf337b35b9f
SHA142425795baa91001ae79743a9e9023ec0ea5e6ad
SHA25642b4cd144d1a6e395f9314ddf963ea65ca957a0a813d71b5f6e07ae40513c613
SHA5124866f01ddc49b59ba44cf13628bdab7129a72cec8563bedc4664bfb2de6c0736afec2960941f17b274a4680fbaa745bde471ce623ed4f589ac31f7fe6bf4dd71
-
Filesize
724KB
MD5277a53a3922d71cc99626ab835cc8677
SHA1e711062e5fef4f8c2e6fa2a0e93c0a6aca3a8056
SHA256dae17c53566d83e24b8dbeb4329ff9a11999b05d30c2fc1d8d6a585535f6d3f8
SHA51233d8a7843adf6c32cf6940806a0d934d67b8f6236ecbf560d226fe45180eefde35bdde97079a3f85f58188be199905255c51bc0028e4222f1440ebe51c224ba8
-
Filesize
852KB
MD51822748dcb06d101954426fe75a62eb3
SHA18fd06ab468b681cb2818ac729594357535fbf5ec
SHA256faded3d34e58c4dd61557f1f4c14c2dc83685a2259fdfa641f5d09eef5bbfbd5
SHA5121315d155bce36b542d5b65def911e8e6fbb215bb11826bbe2e3f2b34f9e6163d25bbf880a59d8735aa02cd701d16d64d3ac61bb93a63234da0c4bdf22f9d08c8
-
Filesize
1.7MB
MD5597e878419411cc2ce35029b9c44cb72
SHA17d2d43b1c87679fcb9f6818ed14bba2d0e330775
SHA256eb3bfc21fa8561afbb5ce1298797b6b832b02d2b09dff878725a035e19b31da3
SHA5120b6f29fe03181458f335b440115b8b364b8ce3da554682affa7c2832530d61ec42447a9a7cc85f709ecf93209981133d2c98b150e49486f3227c165f3ce4057b
-
Filesize
690KB
MD54bc92038a76a457a1c36499bd843aa1a
SHA10ec0ab717f116231ee1f120e958aa1876845ffb0
SHA2566084e9d7bf40c57c141e99fd061671abbf82dda61e8567dab22d4b5fdbc0cc29
SHA5122ad8b1432bd79879d92e0d64ac0a5f14f554683a123e7fb86622a5263c3844c218d14495f60b4987add2e2d425348b3b63c1c398ae7ab5c59f11f22f7ef3e768
-
Filesize
3.5MB
MD5d2d0ff97605d2c2f8921e93062eb01ff
SHA1586cdca915f47fa4b1010f781ec0504e3138efd2
SHA2564056e0804a13d791362555636ba34158fade7c1e71599e415a285de1472d83d5
SHA5127bff38be4c5c41a978b33b9458dc885c59e68fa3dd4e56c6b980d334837bef37b2205b1b69aa1f058c0d8e24e3938c29da917a198b640b521d9726a505683b10
-
Filesize
5.7MB
MD5766eba8610853eb8c8985a3bbe44f6f3
SHA141e12e3783b5210735cc8a9f8e4bcf8da43c8e36
SHA2567e9091666d5253441fe0639d01867450623a4add8fa375a31d09e9d1b0f67026
SHA512688e5174c931fe0e3661d4a45139b5faea5460efcd30491dd9258ad5f36872ce51646eb638c837e8784785fe1806a63e5f68e796e68eab8a5ecc98b22cfd44e6
-
Filesize
1.2MB
MD5eae2a95bb9404eda67360ebefeb32080
SHA1a2ba1507a815c54a91f74f3f1965ff1cceb75e13
SHA256ebdf82bf567ba506879352053d5d670b369a41cfe783f3c177010460146518d3
SHA512f6a06c3d678195b5c9b091e89b4493cf4012f1cf1f820f2778d28236d9566ed115feacb07f237ec79a8b71ddba3453d57233c63e079a0b498ad09b561a0e472c
-
Filesize
9.8MB
MD59705ff0fa594bb28520963db19f5471f
SHA10ecbb9512795e2617cf48618dd050dc0f044df3f
SHA25666f13a0329f46e2d26fb483cb497dbdf7bb6b84d85c2e7c5bc8ea096a8bb8b1a
SHA512a06dc6b04556692c5fd363d15590d485ce2a8bf4eb7a6a55068aade31c7db0c7b6c15249e2fc037a1b94d6ace3ecd962ad2c9cff21d50c205134189fa928788e
-
Filesize
108KB
MD5e0b6f3c763f192a08115b87c4a4e94d0
SHA1cebb858de268b5e7e8704b6b5cb3d5ab1f5614d1
SHA256e334032ec466005f07645c3c0f5ea7722202189c4b5723ef5dad77a129549791
SHA51241d150a16d95a12ba296f069556f7dd9fe1f20389c34a4551866e41bf68f684e44093efe0ee688710a930be6930c08c80f8ae74b00e1cea8c81f94c2db46742e
-
Filesize
4.5MB
MD5c1649e692c3ad2286f00ea3d0c308b39
SHA1de4eea121c46b5c78e7f00f982dd3b451cad857f
SHA256873ef5948a0913d4487dab8ccedd3d17beff86201a0d48b111b1183772ef1bc9
SHA512ab8fdd87765763904c7d52c71023fede5f5692f38380789ea4d90c4ff7c88b8eb59fdac471a15d399a271280ca470f2f224108495710d9922a8cfb72be11b05e
-
Filesize
89.2MB
MD5481df7f01a1b3a6d028790d20f2d97bb
SHA12d56b5244ad233e1c9ca727b502d5c54976ba431
SHA256dc01fa5ca5c750c8c9ac807ae10cafb6edc3ded266d116dbf488c5bd67ee96cd
SHA512630a7931f7bf23f27580c87dbd9093e78e26a322e708faca6dd79778640e624f7816c84114be28017fb26f53f49a56bba42ecfa96be06b901d6e24a087a4ecc6
-
Filesize
307KB
MD53e292ba6a915ec8b8f2408e71c03425f
SHA1c8f4ae13011061239fbcb837d2e2f84a9e876e3e
SHA256ff9412b525b65672142841dbef0f334279b5302cd9712710bdc7143584f8b502
SHA5128a5f4531fe7aed67cd146fb53772fd5a3fae9aa24eb4f58ddcda5ac56fc6fa22fa8fbb824faf8abac992c5c0d24446593dd05ffe106d2c29fbba0fb5a095c5ed
-
Filesize
307KB
MD57f1598c653aaa2879ecc1cc20cd9f515
SHA110a2d8a72e0986962f6ad544ea1c6042fceef402
SHA256a41ab9fc62228f7670ee4671d1b076db59b07663a60519559207d22c4cdd4a04
SHA512fddf3976e8263df6ac128be43393f42b3c7c8d114381512752e5845bed0b538717a63cde33a8fb2649568d34cbdaad7a7a5049f60d35c1f072936294c07a76f6
-
Filesize
353KB
MD560c21da051795a1cf427d51ff7b8084f
SHA108f2469e42d76d7cbe03c674fde9734e46c45f52
SHA256de8e1013cfc781d981f2a06abe714a5a45d76b0e7f55f137ea7785b26e391a8c
SHA5125100a4721b53795b97c5e7f3e2179335e103a0c32890ffd4eef2468a9e868da781b366f9ea3f872f2a96293340135d0f79e55dc84cc8dac36528fbfe969f13de
-
Filesize
456KB
MD5f4018fb82d1baeed446f6da78836c2db
SHA14c86394f38f791c98f5c673f245e71a5da6b13c0
SHA25647d52469f70d3b2dfcd2833dc76780c7c9fe493ff2a1e3b962a22f1ef6739d73
SHA512ab3e6f0db18ab2760d0d673c4e39ff9d173b6df134188a7e528942b027176d79582215d5f75c3da63e1555c6832b05d7a9e901668d34c6b05bce8552696018e2
-
Filesize
219KB
MD577f47ce82e5bfc2200c7abb88b267123
SHA1088c5d7137e70687f78b3252db7134a6c219334c
SHA256b3b2f1af10ce9290a4c5a6c7a4799643a91b0a020771ba6715ba2b7e90f9b79b
SHA51261605a0e99d0cb5aaa0e94143a212efc71aaf7ecc92ba48c6b6b767e2cfbaf0910b9a94b8941d07a6db14ee41d97ad3a57b3b219fc8d02b75af8a180ecd3d15a
-
Filesize
222KB
MD5469e61806b2ab8ffb9155a03896c8302
SHA10ec06aa7fcfeadb9390e284f06164a12e44451fd
SHA256111e13702813038d6359a912b2ca544a1f93f0ea141e71bd97a57a968aa3cb72
SHA5126fe7edbba42198f5253cf1dd3ce077c0ac2b8118d3e00727991dbe70c6be4abf34db3d2aa9595876b09f03d4f639bf431ffacf5ae57f4c8167ec59db979523f0
-
Filesize
199KB
MD56c623ae0860ccc782fc004667c78ee78
SHA177b4f676c50758ad040777f608b3d7f26cad466e
SHA256ee304be73b9e06bc2b01aa76266d88bd0b24d8f3ed1fd28e61e165bbcd4c03fe
SHA512c4efc7568a8ad9392ca4255745e5ee1603171fd14fa4ae054b6794b3bae32846f9c3df8f200f9e8fd62dd72a72d841f9537054a3d079842ae416af1a644462a1
-
Filesize
217KB
MD50e3b31f511b316bfd87c92c5550f1cb7
SHA14d84cd949704adae1b26481c8f8023de96ff88a6
SHA256f79f058578bb810c135d34e5b1285299d18cd24f333397997354ad512b6e2667
SHA5128ef155f67f9d6f2d9a7c7d2293e0f1cdee7943b3cad9c39620b5628deca008d6b86211cda2132df68ae9c4615837c9096628a857c0ec9f10e91e35480b14dae9
-
Filesize
387KB
MD57d54147bd7ce0e3289cd2c68ef3395a9
SHA1a6ad275cecaca42ecf86c9a21404bb32f2cc5b54
SHA2565384aadd68f14a95260e4364efe1b46e7d6ba60d47a298b2fe92f71705f754e8
SHA512657e11b9616ce37a4a8c2e0a9aae056e9e6cbfe2b42dbb50ad173600fa65eb4f9b419620963cf4b952588bfefee24f5fa56dde67a8a322715f7b321cf27d35cb
-
Filesize
179KB
MD5e06bee2c069738c1761b1f07a5a65c3e
SHA106a392f1c7b2081ceed5e498dbce5fa76955350c
SHA2560969f4a50fac5f7f6d5040f3f0ca1016de578151d1633780fe7d8e3daa8c29ec
SHA51202faee2b47588b27a82b1c98b8096f3f25a219d3e7cad11c7eeaf3bd3fb20fe51ce8db37d4148eabd7891c02e7f4f8c6a8612355c9dee2d0dd117f553ef6cae3
-
Filesize
180KB
MD5dc99f78630d32819ebce696dafd26579
SHA134e9f3f8be6fba7e0c586cec4aa203422efe281e
SHA2563e3d563b035609fb2e0dbc9cce32c23fceb4e69db36b9d49ef355515b425ba93
SHA512460f6a965534f99bc5c5e294bd7571b0e4291bcd226da0c808eb4181984f279edea0325d1816c3d654b78cbd05fb3a5e233c0fb5bb8dfdbcd010ed17f6b4de9f
-
Filesize
215KB
MD53b0dbd76f824d646f684a1eb7782bb60
SHA11446a0f18ceb493cfc6e18ab6a08b51e6d6aa596
SHA256307994b5e793c569606a14208bcba658ff5f1ff8fe92e3a16b3f05e2cfbbf3ee
SHA512cd5062e39eff21e8a0e15ff2c3d2e531a2be569ff22adb3c596044e3b4663c6df35a9513a8d98b5fe927fbc029eb89d9c3806a32a4c10fdc5ddcbd161d3c55e9
-
Filesize
218KB
MD5d546d7722a37ba055ab8a33b682b8a19
SHA19d8939dacfeb9830d46efbe94e84f476337198d4
SHA2562fb12f93c3811e8c4f1a01472f1f0b4992f7a11889a3f64ed73e867f30bba46d
SHA5121f3d830308fe94cb4fa5ff02f9b83790a723f46024222ea7128aaa7f7d77e0a59f2cb6a7f8888a34810560d46d647ee677ee6668a00328cd9c9f83a31da6570a
-
Filesize
195KB
MD5468578bb57b0616b1fef43167cec075c
SHA16858327c4fbf47b87b14a48cde7f307ba0bdef36
SHA2560244e018424f65654f6181a022ad20d96365c0eb90676dff01214eeec24d40f6
SHA51288b116f7d33cd79916a405e4689bda2b9d89f803704e8cafe0475fee28532d30900b3aa0c5459d1dd79e224682894f6eb70beff7b4fcee68a3d39003180af803
-
Filesize
310KB
MD574cb66f8ed8c4e708a687f8b6e018abc
SHA10f577813cb11ff371057fd5aa027ceb5d51645d8
SHA256abe333527dc0a9fd5f8b4e534db191ef74f4e9f015a40d49fc36bc71895af66c
SHA512dacdc6f395ad395740ce9782253d2e20b2715789833960ba0647f6b4bc005e171b58966f510ed22f1421e32bd46286cced796d3d150859c64657b340082ddfee
-
Filesize
201KB
MD5a86418f62294a4db2d45b1dd662300ab
SHA1007552b7890ab9ab3ab59c5de53c4fa6b2c2f757
SHA256fda77c3c1a4d658e3d5db8940f68bad017dd79fe30e8430a2c1eada2d7a504b2
SHA512e1dc0edd017fd7554a93fe945b687a6bcf96d4d5516a23f85a665093f8b7721b279446738833384735255a4e5e4ff98d2bca2b5c7008e509372693d20b286b58
-
Filesize
221KB
MD5e9e9b5738dcc5c64c0564ebee8cb3f48
SHA1b1368226185f02511862f0795acfcf9070a555c8
SHA256f74e56617241f9e6db3aba7cdf0e2442f9b048437ceef7bd401f50f9639eb30d
SHA512e7d8c13c4932bc7ca5ded567dbe19184ab199a556635a1f94f67948ac4e3ad57b4ea0d658074850b00bbc1574609ad486658a753f344c8b16c372fe53bced47e
-
Filesize
234KB
MD52352a2bb3481eea03c76a67b8677918e
SHA103644bd352b256980e9045e20964733d969b877a
SHA25611857a275941715d519cefac3105e906fb97777b712d095844c5f8666dc36c6b
SHA51217f2cbdec9775e4bb52360e76a1a5aaac9d9a2e616d115d5b84f42e86e9db1a9ebb48f02e1e3e9af8183707b9a7e85595f36a85c0612cfad9ee4ed280c320e9a
-
Filesize
433KB
MD579886060308ca116d2e8916e1682b828
SHA1dddea4d8e41d1cccccbcf47d93ae7327e5f27f81
SHA256d67b61f99067479b2492aae7f204ea0b1ce54359a21dbd685202fbf22503fa89
SHA51241f813711f46800a9dbaa3650aad99d1e9797ae8a8bf44eb432d47856b0fe3989641a81a799f196d577497b952cd938e667b62fa7c85cc89ef08ab02b705ed80
-
Filesize
262KB
MD564e7fdcd09abd5e14521f6e49fd2436a
SHA1db8d47bb41e4dabbd5bf09154a22b4b97d727c60
SHA256cdd6702ffd3f9f96650e38a29b7f4105d50cabe6ec13c68c276aa85b9c36cf5e
SHA512e13a96e7b0169258f2e88a93e33bb828bcff69ef3bd563743c8a7e05a74a541b594b913f33ffa972f4ae8e20338340603d6d381a73867cb9525de314aa638a70
-
Filesize
445KB
MD5e9a7bc6dfa4016bda1a4faadd0a96086
SHA1c8a34f234ddbef70e289f86e261383d605e44042
SHA256af7c37edd3eafbce6698e270070cfa55b3975d0d87d2336ab09626a9ffa458e4
SHA512ddacf9d5cf2adbc5a008584816a3fdc77dd824cdf83b65cd002f4e3415bebc017f3998d80d9743badafcff5950181ed03b5f75d0bffffdd949f9812eb961bf19
-
Filesize
211KB
MD5dbb5a619e31e3958b7ee5df2e68a44da
SHA1a4dc7b9c7a6e2b9c7388a9214a31bd474bc85427
SHA256728fdadf1773de85598edcda70bf7f88a9a46c67de01433cec39b2ff77ff5605
SHA51268141e5ec9263e7e85122b9be0c1088c23f752e98f5147b59a2bbad4fdf6936d9a4bf93439a78723a15f0b7c0ae878914c625618fcd2d28a0fe0cfb7f809da37
-
Filesize
230KB
MD583f2bff36db68815963734c6f14d2cea
SHA1f331a6f077191f98e83eb228bde5db7f199a028d
SHA256db0dd153fabcec2e31d652807226d5ffbd7c26231adb0aa5602157500c7e07b8
SHA512dfa645f7d94ee691be6bfc4725acb5e70f8ad14b952c614d2477f23aeea7bf2ba8b2ed08e202a8ce52d75b1741c98e66a8393e0a3de83158ad16e879c6bcffa3
-
Filesize
193KB
MD5eff880916f5f7ca92fef688128e7b2f2
SHA1a4bd046d14dc5135731e962e9e0fb02d84161bb0
SHA256f9c3b84bde54646db226261e2a97c491a2b29a2de96edb7825f05aafeb9a0894
SHA512aeabc3b258dd5c47f76707adc105d19cc1471400099ca2db29de491f79ee4729173d5ebce63ec19604dd2c87cc2a39213d0b39b294d100a98a007b26fadd50f9
-
Filesize
211KB
MD5b1af2ee608bce8b124401f0f1a8e1719
SHA1264658a45c142e9b429d0cc578247dcffffdb612
SHA25633ee8f8134b149aad248567fe8e5b220704f7422fc05aa1c9de72b836c74d52e
SHA512392b3e416812ccb0628ff54488a46152f7f9c4125570a65e967d35ebac775cdbea3827b5144837f4ca18ed7872faef669848919201921404d9eedcdd75445a6c
-
Filesize
262KB
MD5fb94a46c081766f72924c0234fcb53da
SHA173fcf750bb3e9603dd7794e5ace42c82988eb9e7
SHA256851f8817e1f85edd320cfab4b560e8b468ce4c53bb739e8afa14997c84f58eec
SHA512fcfae2e9ab0732139b2c6a9431ad272e76a3123e0f924da6e9d29bf0b1a4321ccb83d3b1941d182f755b081c8d1f0037505ea2bbeb91259953a1cbe327b6db1f
-
Filesize
505KB
MD5a125f1889817658c5c2687ee8f9f321d
SHA1e35b08389a40dbde5e03a963f89393d645f8352f
SHA256bd3a3e1cad20c2681f3b2e0c3c0425cd023d6c116b4bde5692ebcb54c64b25cb
SHA5126b39f061b1611914c59093b090f6139037083f3029545cdbc54ab96b478433e52a7f05fcde618102fa2e5711bea6fdbcd6f12a98d98ae70a8179f4068050a78f
-
Filesize
220KB
MD5a25bcd561eb7da40b12e4670d751d8e4
SHA1a2d08f3185307d9f589ccd408e97386f213bbe47
SHA256ae0a82ba25b8de9cc46576ae22a23d2b42d44d80d885fad801be3c86f4a5a23d
SHA5129c8fa113a1b70d51b41c525cb85fa9449b136c2f685e33ec34b581597a90dfe2c166304f0c66f5c14c8d6a5079584fb19a06f68dfb8c0c5e21b4695aaf5d7122
-
Filesize
226KB
MD5c2245554244523776eca368a82983ee6
SHA190a51f9ddfc39cf46a4bb40163142e87dc27305d
SHA256e4bc73b72e21433ac030792508b5c035a691d98a54e1ea9da6374eaf10136674
SHA512f73a8a5904b7ec450c06341f89938c38ef296eeaf2c19ca50be84af3ed36cc35e8573c83c717ce761d9b85ddc824091c4d5c775fe937a2d3050fcc01c874732d
-
Filesize
225KB
MD5a95048f767306a131b876df74cf55348
SHA13067ed001a6380c65479ef0fecd02d1161a0d5d9
SHA2561d99df3b2e361dff299af3536eb878407779ce881f6d94079518bf887795d794
SHA512f1854324b83e74de089a224e74e5ccfed45ed2abba66b0232c5019318f7b56bffba14647b7f102bd5052a0ddcec3259bb9df67eead04bc1811e144edb305f01c
-
Filesize
543KB
MD53ebdfd0ab9999b5ad515eb052dfdc577
SHA1f4573147e170409dfa1551393f87f396d1e02d3b
SHA256cdfb4b55f697311ba2e81bce89c9e4f1e1592d54d9bbeed23122013a3fa2f8e3
SHA512d35b186f0c7e225a27a081df288efbce988c449510613e5955df7bda45905b76b97a7864a250c60ca5c5796963da413194c697cbb074689c7e1f441e1f98c85b
-
Filesize
440KB
MD5f242e8272db35e1174b498bbb0aa4949
SHA1fe40c221cafc6c234f7be145f17261812e260e3e
SHA2566f863f60ab41b9803333d576300d82790d4f52be4c6994e56d5733f167310e4c
SHA5124d5bc907974a5a0df435aa69ba32a3ffd98634340278194e8a0af7ac5e1be0feffb6b07a4190c2fa7cb81e9518cdb02a995879d88465ffa0d9547cb98bd84bc3
-
Filesize
200KB
MD5c8a712e9cbd091697903a118f8e4afe3
SHA1c6e46af7ba006c96c92312228b294066eb800e96
SHA2564bea0031a0115923bac10aebe42fb0dcf4a49f54e28a8ee30edadfd1af1a7262
SHA512d20d630a5bc217e692f208dd4479c437797249db4c87711098d4bb97b57b3e1bb816a230f84ebf01fa6fca2240352dcc28d1173f5d418a94801b3eef98177051
-
Filesize
197KB
MD5d25fafbf9671d948c510f4fedd257703
SHA1695cbf02a8649012cfece3aa7953a2415792bb05
SHA256a59966ae8e08a47491d2dcbb35b4ff2e149064d28794496566991ddede4d50de
SHA5124e8875770975b3e13d255f392a34e709e798cce5ae6a9fe97898cb980e4246c159cd426a60b67260a160b63951967e77c38ab32a85c649b067ba48543c74fb61
-
Filesize
206KB
MD534bb7a19b695fc9cd97e3bfe644a6bb0
SHA17ee6f12579417783f42915ba45dd46c3554c8584
SHA25693196be4f6b6b055cf8cdcd715e04db564644657b5c73a84aca9bcaa5c89f3bb
SHA512ffb689d62d79ad0b1fadcd6b0e428a636c0288b939cb6f58405ed366f019d8f5d16032b46f0f9e05a66c3241d4ad71b150a1a99a2ad0c18a6c6de5c9ae8ffbf9
-
Filesize
219KB
MD592a70e7431a2d76f54070f86f99bcdfd
SHA1e4f4d94a77104902e859b4d0c99cefb85b29afb6
SHA256da0dd276248e46c375a09a308a266f8708917b5ba6fbb0ee245fbb988ebab785
SHA512b595026998417a12579a13e6b1f6b510f364019ad0c84a94fdbe065fbef07307683f0ad3ff6eac6dd1c8cd22ecfe4f83c8db4808a5ecb66a58d4cf782aaa2ad9
-
Filesize
212KB
MD5f2d645cd25559f8ade54d1372f864294
SHA1399d0433975ccfdbe1da399ba1f742163583812d
SHA256a2ed13735176895507e6600718a7f2a13689c246950d1d807b1b1f16d64af2d4
SHA5127a22f3667ee8b4647d0d0478855609a19f485d71718c93e0e709ab58a286974196389d3705c322c44ec8183ee9045c85186288f6e3645a523443bb9ff34fe0e9
-
Filesize
214KB
MD58b0bd3c98add6936eb5739c025a87c5f
SHA14a8c91da0a65d097523680a441150238f865cd42
SHA256369fb57c64066aac72ab8a5ea44cfe87e83a25a0a9b8c66299d4d372e637c46d
SHA51275b7461be36d2976d7ba9ee51d4296f58792232a52cc96974ce6b5f5e27c9fdcbd9fd0fffebecd381b722b5b15efa310d6cd7f0369c50602433182bf8e143a17
-
Filesize
220KB
MD5657288dc93e6afeeec4e561ef672cff8
SHA1ff3e00c80f6436e257dc36074de88198ec1f2abe
SHA256d4fc7478164a2c9cd60305f75be644b1f7b80ef8b14cd4a1c34fec2e9434eb81
SHA51263cae8feebd0f15313542a888d854429a1b97586628da9be4997417172ef60aa5acf64bc24fc5e1cf1ef09734a82f09f0efe014d5ee05960a4a209cbdc5845e0
-
Filesize
16KB
MD5050fc31c8fcddaed084965562f5dc2b8
SHA1285a02a573c9359c77b4c8f9e127d331a289c091
SHA2564f073ca28aacc0bc59b6cf2dd2ec3aa091af803f53174a5d7fcff75f2e9c9edb
SHA512013b9a32a5f3406a54ddf766e741dbb20619a800a3adb02fb31245830add87f56e0dd5f33e683b373260ff8c217c97bcb7e650c2506243121e7f19e42c0bd695