Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe
Resource
win10v2004-20230221-en
General
-
Target
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe
-
Size
1.4MB
-
MD5
34aa0ca40863c30653a0b6ba10d3daa2
-
SHA1
c5dbbc9a3f6d537ab49aeb89223810cd67c256f7
-
SHA256
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9
-
SHA512
34e46909f3ea586033baa5f73ecbf1f5072f2d05cfaf77f6ab2535ee0798f01427b1e62719fc4026f4b38af03e445a33ff2deb22ef9817ab42e506cfb5cb10d2
-
SSDEEP
24576:O94Lauo2BLrZ6dj7Wd50QKQIsBJXkQsUc/i/Egj87qLom0Y5m6Uy:O/uHrZ6WPKQ5X0QsUN/EgQ7qEmv
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 15 IoCs
pid Process 464 Process not Found 852 alg.exe 1084 aspnet_state.exe 1460 mscorsvw.exe 1052 mscorsvw.exe 1980 mscorsvw.exe 1852 mscorsvw.exe 1476 dllhost.exe 1708 ehRecvr.exe 1676 ehsched.exe 864 mscorsvw.exe 1816 elevation_service.exe 2016 IEEtwCollector.exe 1312 mscorsvw.exe 1652 GROOVE.EXE -
Loads dropped DLL 6 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\259b75fadecfa14c.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File opened for modification C:\Windows\system32\fxssvc.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\System32\alg.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 824 set thread context of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 1488 set thread context of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{5E6CC4C4-D28E-4D0A-A931-461A4A22944D}.crmlog dllhost.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{5E6CC4C4-D28E-4D0A-A931-461A4A22944D}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe Token: SeShutdownPrivilege 1980 mscorsvw.exe Token: SeShutdownPrivilege 1852 mscorsvw.exe Token: SeShutdownPrivilege 1980 mscorsvw.exe Token: SeShutdownPrivilege 1980 mscorsvw.exe Token: SeShutdownPrivilege 1980 mscorsvw.exe Token: SeShutdownPrivilege 1852 mscorsvw.exe Token: 33 1836 EhTray.exe Token: SeIncBasePriorityPrivilege 1836 EhTray.exe Token: SeShutdownPrivilege 1852 mscorsvw.exe Token: SeShutdownPrivilege 1852 mscorsvw.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 824 wrote to memory of 1488 824 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 28 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1488 wrote to memory of 1544 1488 427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe 31 PID 1980 wrote to memory of 864 1980 mscorsvw.exe 39 PID 1980 wrote to memory of 864 1980 mscorsvw.exe 39 PID 1980 wrote to memory of 864 1980 mscorsvw.exe 39 PID 1980 wrote to memory of 864 1980 mscorsvw.exe 39 PID 1980 wrote to memory of 1312 1980 mscorsvw.exe 43 PID 1980 wrote to memory of 1312 1980 mscorsvw.exe 43 PID 1980 wrote to memory of 1312 1980 mscorsvw.exe 43 PID 1980 wrote to memory of 1312 1980 mscorsvw.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe"C:\Users\Admin\AppData\Local\Temp\427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe"C:\Users\Admin\AppData\Local\Temp\427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1544
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:852
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:1084
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1460
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1052
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 1dc -NGENProcess 1e0 -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1dc -NGENProcess 1e0 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 254 -NGENProcess 25c -Pipe 258 -Comment "NGen Worker Process"2⤵PID:2148
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1476
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1708
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:1676
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1816
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:2016
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1652
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:2064
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:2316
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2396
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:2536
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵PID:2568
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:2652
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:2680
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:2752
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2840
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2912
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:2992
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2080
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵PID:616
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c5a34ea55830a3cba11cc9c16cab92a1
SHA14b7dac3e0e5bb7a0001f85dc02ec63d456a52a99
SHA256a93918b871ac046cfeadbefd6ca5a0abce3c7df02a2571e9ecc7fe34a8786b3d
SHA512d28ecaadc9abbd7a40936ae06701ffead43a0fb9ad840c75bed073f72b73c3c04db38014a6c89f8f44d9bf98888cc2bf93001f510456d95b2a894a92833670ec
-
Filesize
30.1MB
MD58d23f3efc4e1d3cb8643f52a33c587d6
SHA1e08909690ce0f34e26ada3830a40520163625d4e
SHA25672c839950bd8b4dfbeaf1eb0d016910e733bcdbf3dc0e71f316f3c79b12a031b
SHA512d045e0a1bd89fab0b2b74db12fd07846822a03b31c7a37cb0c2662ab0e3908579a2779ca780141ef2c2a3fc5233d37b13e6dce7d986d7c784c802ec0af43c57a
-
Filesize
1.4MB
MD506565cedbc3331f3275c4292bdc3df10
SHA1c9811435fd4eb213d263269b62f63ed7e629cbbc
SHA256e642e65fcfb627583d0dc8024227074781ae224e8188d5a80b1f484fb4be3311
SHA512bee855dc9480a3a691cc7863f10264b5b80b1895a8db08f7a1716cd898df4c697b0c61996f32de4256749922af2268e8f0dd4efb61488586db50d60f826f9a65
-
Filesize
5.2MB
MD52aa95c8891e1cb2350bd7ea8d0f5dff7
SHA108699efa7b22812eb293e6255aa42b5997d39c2b
SHA256f4b8c8ee68b9f2fd1ef847d40d817d7016d583b09e7122452b496334824aa5c0
SHA5121ef04b3147150c67caf3346bd466c7db76fcc748fd5ee8139f69849c5455bb4fd9dfa376b676f6a440a7ef4aeb0293dd4f18197b648b0bf58b902d2580c2af14
-
Filesize
2.1MB
MD54ed89fb8cad41af2a9136f26273a1585
SHA19df4af8efa9617459b90a0394addd0741e7255cb
SHA256f80f7ac6138a4356bd249df93225c6e7ff608a29a6a6d4f9af0d24462415bfb2
SHA51242cbe3afb7e1aaf3735f7f064960819915242fd0bad55b58dc3a15cafcee4a90dde36c8d5baa859b49c8fb8a6a618efaf07c9657d4fbcebaf5d8a371857bf2cc
-
Filesize
2.0MB
MD553734c8ccf959b41413d3ad268365c67
SHA1e8772d3bbe13994bfa702ffc816b1f419249ce21
SHA256a7310e0cf624e4b7d5ba4b9afaff3c0bb93c9fe94e63894ab8273b8f5e3c4d08
SHA5120acb0c8eeff7b5f7c66679334bd238ce03d63e5bcbef12762265882aab5a7bb9dfcf19a56a2b0956b32f2ab9657f12a2d367dbab000daa2ce806e9bc71503775
-
Filesize
1024KB
MD5c194b25c6f7750aefec4cafb5bd17959
SHA1b10f795fd39e871a7bdf2234c8906a7143483cb9
SHA2568849e045cc953e359023f082406b1eb5e840111cd067910387e8d33fabecd723
SHA51242c90c533641c6df67d7a8dbe60bd0612463f583708fdd0bed10fd482f5f91ee2b1417bd1f11d96f88128b547cd47c1ef3042ca957f36342c0662d7b427d8d0b
-
Filesize
1.3MB
MD55998aebf9b569cbfec9ba514a0422bc3
SHA1fd4d30861404a415685ec75f6fed0b6d2d9b8eaf
SHA2565d4558cf105cc39b9c18ff85de3a3715ea680bb305ee1b4db6a2d111ce66418e
SHA512e1044dd6eee3766d7e3b234e58609c0701cf310780b0f01e674451067076e25580ce27345972cf6b68e752577dc0de6bea88b2aeb90712ec580684c74224dd07
-
Filesize
1.3MB
MD55998aebf9b569cbfec9ba514a0422bc3
SHA1fd4d30861404a415685ec75f6fed0b6d2d9b8eaf
SHA2565d4558cf105cc39b9c18ff85de3a3715ea680bb305ee1b4db6a2d111ce66418e
SHA512e1044dd6eee3766d7e3b234e58609c0701cf310780b0f01e674451067076e25580ce27345972cf6b68e752577dc0de6bea88b2aeb90712ec580684c74224dd07
-
Filesize
872KB
MD5611f41b18b5db1ef94a4905fdbe8e7c4
SHA13ad7b4d3b10f362eeac0b9f6d5caebe3e3037211
SHA2560195c5c907a90db18484af4a098a00b4df6a23e786e5791c4a8052b7417017f0
SHA512165714d27525ed7bb45244d9c93608dedcfec80f5e96aa97871aae1a3b2771282b32a8f183e76cb32f3144c5d1b3fa37d610c96a9e8e06b3aa733cb00fdf1b28
-
Filesize
1.3MB
MD59c7e66fa0d21385a532fa989fe2b9102
SHA1db72f10ae4ab78f14638c70c357a33597ae9128f
SHA2568df3ba40e6ad1434d39f15a7c9c602a459b0f6b58b77de933a1ad5a887d644c5
SHA51213076d7c4a0c1fc5fecc92d7f884c11fb52f637c1ee82faa6c50189363f0775c19d82190446594f99803b08c5cdacbb62331106d10ab9acf881ac5b5a5abaf90
-
Filesize
1.3MB
MD5657f88f820a82c315ae025bbfe152b49
SHA16a04c2cc9ce2782904b8e58dc65187f120f6b773
SHA256ea068a56839ab3bbb81ba6b36199d7cf27619d2631323637902430b6b8310995
SHA512adc14d18941980e6dd04eb17c7b8df180f06a20e7fa4bc4c25a997a0473c689d61b2b7575c4bde6b62b57946ea3f792976069b204f428ec8c23892972863c98d
-
Filesize
1.3MB
MD5657f88f820a82c315ae025bbfe152b49
SHA16a04c2cc9ce2782904b8e58dc65187f120f6b773
SHA256ea068a56839ab3bbb81ba6b36199d7cf27619d2631323637902430b6b8310995
SHA512adc14d18941980e6dd04eb17c7b8df180f06a20e7fa4bc4c25a997a0473c689d61b2b7575c4bde6b62b57946ea3f792976069b204f428ec8c23892972863c98d
-
Filesize
1.3MB
MD5f207c252ebb6b8ddb2bd232cedf365a8
SHA12294ea2855b72b3b7e51ec8f49917fab44acc800
SHA2562f27a57271a6662b172d739fe66da724630d29499a9110533d40c08beb2151b2
SHA51218f8d1f9b0ed170b9ae3d4f2526510cfb2425872e82ae4be59c9435410f88741fcb3761ca15cbb7bff94e0afcbd279470e92054b2199189ecbb760ef83c55a0c
-
Filesize
1.3MB
MD5f207c252ebb6b8ddb2bd232cedf365a8
SHA12294ea2855b72b3b7e51ec8f49917fab44acc800
SHA2562f27a57271a6662b172d739fe66da724630d29499a9110533d40c08beb2151b2
SHA51218f8d1f9b0ed170b9ae3d4f2526510cfb2425872e82ae4be59c9435410f88741fcb3761ca15cbb7bff94e0afcbd279470e92054b2199189ecbb760ef83c55a0c
-
Filesize
1003KB
MD53c21ae9a76067bb1d11851ccb0c9cf26
SHA1c84a78017e0c7dba7c6bc761acd35cc56867dd70
SHA256503e612dad04188e63528ed53e7864ea28716e094471a9741a5650c5048e811b
SHA512a33bb6778832c67a40049e4f7008f243eb60f546a822271c811889eb4df4595e9ce13f42d172e1b66853cf2abbc8191c9856a4fb598d84d5944e89aa2798ab65
-
Filesize
1.3MB
MD5f82f433f7b4f2343b35eea5049e5373d
SHA142b26fb967b14d25af2142c703e546f4d830c9e4
SHA256e35d914a9180743f9c2306e2bd65d594cb7877be3f0ee32b60773e64f14335a1
SHA512b28f88925d507a56deae7ec3144b05bf35dca1c5373ee646eba8a4b19c8b7db24544f3705447562419c8ea7fd0f487203d1916757127d72822b664245159449f
-
Filesize
1.3MB
MD5f82f433f7b4f2343b35eea5049e5373d
SHA142b26fb967b14d25af2142c703e546f4d830c9e4
SHA256e35d914a9180743f9c2306e2bd65d594cb7877be3f0ee32b60773e64f14335a1
SHA512b28f88925d507a56deae7ec3144b05bf35dca1c5373ee646eba8a4b19c8b7db24544f3705447562419c8ea7fd0f487203d1916757127d72822b664245159449f
-
Filesize
1.3MB
MD5f82f433f7b4f2343b35eea5049e5373d
SHA142b26fb967b14d25af2142c703e546f4d830c9e4
SHA256e35d914a9180743f9c2306e2bd65d594cb7877be3f0ee32b60773e64f14335a1
SHA512b28f88925d507a56deae7ec3144b05bf35dca1c5373ee646eba8a4b19c8b7db24544f3705447562419c8ea7fd0f487203d1916757127d72822b664245159449f
-
Filesize
1.3MB
MD5f82f433f7b4f2343b35eea5049e5373d
SHA142b26fb967b14d25af2142c703e546f4d830c9e4
SHA256e35d914a9180743f9c2306e2bd65d594cb7877be3f0ee32b60773e64f14335a1
SHA512b28f88925d507a56deae7ec3144b05bf35dca1c5373ee646eba8a4b19c8b7db24544f3705447562419c8ea7fd0f487203d1916757127d72822b664245159449f
-
Filesize
1.3MB
MD5f82f433f7b4f2343b35eea5049e5373d
SHA142b26fb967b14d25af2142c703e546f4d830c9e4
SHA256e35d914a9180743f9c2306e2bd65d594cb7877be3f0ee32b60773e64f14335a1
SHA512b28f88925d507a56deae7ec3144b05bf35dca1c5373ee646eba8a4b19c8b7db24544f3705447562419c8ea7fd0f487203d1916757127d72822b664245159449f
-
Filesize
1.2MB
MD526357012cc92bb1a70459f2cb52187a8
SHA1c3b67ca41e73f7340c27c99afe39e6b897dc297b
SHA256a715371e4d07edf758ba447de1203bdc3748b60389b0a69bb56e753773d4a755
SHA512e1dcb4dfe56a2831a4a8146bb8ad9d053c767defd6dd25ed2a9d70853e8c16e3b67f33479cbe1414bdfd79df363ea951907f0e806d834884967777bfe61132a7
-
Filesize
1.2MB
MD5fb65cc7caa449af9c02f8c887c3352bf
SHA16ea3c85721354d40d86affa3b68c5b7bac316cf2
SHA2562f008e211bfc22d6863e9d8a6e38bc394a0bc8fe5bdfe34dc28a9c1d341b5d4c
SHA5129e068fa18b4f5a4fa46f5fc48c508febe8605da4455dec527f94a5675cbcb2c1bec474746368421bda81f10f59c4621267c7480e889a643083629924225874ee
-
Filesize
1.1MB
MD50bd3b68f89c69e615dd508904956790a
SHA13deae205d4c6cd1db4d83d52ebe43276b5b8b933
SHA256524e6dc8c7d99b71536c2eacd8253b344231048d91d804554a5f2ecbaadc539b
SHA51259c71c9b2273e4d485ba6c221e2f49ac81f8532aef347d1d7c97b631df42c09bd504491c0bbdfe4f5034063e79318a5f06bc6d82a38c40bc4de7fd11b27e59a8
-
Filesize
2.1MB
MD58c12e67fec936d927b8081d053b406e9
SHA1efe03d64af961741e8182a8ac49c422d50123721
SHA256e5a0411c8e02b7524e9c0aa18670af42db61d5ca4f28c707af71bc33edf60064
SHA512df36490d91a1e9265855f32f58c987b84316ed9d891b72beb93aa69fea6b6cf9d74eaf5ba7b751984ef9ed0468cb24db7eeaadbf6b6518ab69437817075f37bc
-
Filesize
1.3MB
MD59dea1257209b9bd6c163b185a80c0aa3
SHA14b16169c608cfc653e3bb940f1c7bd84dbc7d3b1
SHA25612be3e50d9d2de163005807158be19f8646efc0bb0569ed77ba31cb20f58cf65
SHA5128108af042fc5d19939d5d538dfbaa965edd759f9f6273557b35918c1e09d0a0f6d6e5ddeb8dfa4dd48e607aca4e5dfb840799d0b023b1acc693ae276915aa406
-
Filesize
1.2MB
MD521fad01ab4972330443cda6516c5dbc8
SHA155186b3b9e39bd2f171933034b068ec500d2df1b
SHA256d11e91568eeab30d1c5357c051965227c334f81b9eb13d9d5b6c2fb106a0a8d0
SHA512b7ea704f0922c57f46272c52f698ebc62651441c8c82ed8ac9528b1a52682e9094d91cdcdb1deb9e368b6b5ce92e94353a8dfda050e5510b4cb2b5bea5183465
-
Filesize
1.3MB
MD57f1ecd0d509301aa6677cb2e4997d1be
SHA17b644fc54cabbd4c97fa42d9dc501bf105a1cc08
SHA25634e94e05777ce9a2ebb59921f650a6ba3ad29c33acdc00ea00173262c2c66a73
SHA512c063870c72d1a82f0a7eb82ad043e994a76a28019916c9fc0e496dbe7111f2ec1ca044a898a17434bfceb86d738d7e8e426982d81a1a24693ed4a1f12c9b277c
-
Filesize
1.4MB
MD59642ec8051217f4effc9d94b73fbf669
SHA175e85d437c4c61cbb52b0f30ca8e57ddedd0be9c
SHA256cfcc49c2bc6ada429a9a5b1795779f3010ad9864bdc2f7de38f04dab8b3eab29
SHA5127c047620f395937769d7d5a7873eb975dc1ee497f4d860792b741e066aac6052c424da501e53dd9123cb9978b01f211f8a7aa8ef8a0b9866920803af9e17226e
-
Filesize
1.3MB
MD57bb26c306c0b879b5f79ead095b3dcbe
SHA1f9ff72408bc6561cb253eba7a4a84fa02d1abbf9
SHA256e0ca48233134adcb6a364d92cd5fa8f0c867b99803e4a3bec793e5bd0c5ec617
SHA512bc1a1f99795025d7832d61bb1bce84cef14572a69572bbee22a00b6a5f436092d73fc5b5e88da8a8acc1e64ef9e82a446a381f9dc19c4db397f4cf372eef475b
-
Filesize
1.2MB
MD503cf6592f71c9ac70f3cfedfc92c407d
SHA16b4cc5181a850795ce8eb09e85929db19deda25e
SHA256cd57aeea68e03a7325b48261064ec00e1388a911adf7f75860a46b0e6ebffdd3
SHA5121e556ff0d8fddb56e82e40847fcf90ba61c67a0dc1ff6594a2b22ea3512188ee744cba87c65be4df3901fc92bdc5b39bb684c407db6710f2e4238728acd66b4b
-
Filesize
1.7MB
MD55f2fb084a8e088b924398767dbfd0b18
SHA1e408200dad6a1aec0fe85a7127ce5a78e3baeed1
SHA256eeae487c929b1b6cf2c5e28d2100c57bdb72b0369d029a5478f58ac46c2c7ac2
SHA5126ce89d0ba9eac3e73736ce32658d793f03c91c1a0f6acca2eba68969e877c47c2dc0971fa3c83d646b2dc831e13b4a316d08e88982f81968d8d3f294edfde434
-
Filesize
1.4MB
MD5cd42a8917a24f61994bf5f7866bdc6d3
SHA1449786c43e04eec50a83435baa6a63928cfb5540
SHA256c37a9ad3c72edde92a8b62ca1e5bc62865f4a1c5d32264b15dc5db8d9602c180
SHA5125c630fef09ecfd2163394f686bf2e6d5aa4d18641b4b6b633e432a47d530bd3cb514f2e261def0f31a69fc9b46a8864142df345c2e2102d94444bff15170591b
-
Filesize
2.0MB
MD5e24b241f11fda180141342dc26353909
SHA1b4e1ca0ab4e7ebc23ca8a38d2220b29e868cf65f
SHA256627f32d30a8cf7da6164ff68820028ff6875ea565642415e55d3cde560adefe2
SHA512695da058929da7b0889533391c35b7aa54d7cb83389a56bdb525dbeb07f62e2ab4374f65d84fbd909f6ec673bf12e08decc99c3baaf26a58dc29afddf55c682e
-
Filesize
1.2MB
MD5b2711ec631c34c0bacbf37e6fb113a1c
SHA199827ba93e6bd2f5a6d9bb13fe946c0f562b3c51
SHA256a91342665d6f06a688c86598b677bba4c5caff8e6752c594b6ff1cb747686a4d
SHA5122eb8b6eb37c69df0bdb59e4eb1959e86d830f577dae89cb35a52db6b4c514f5a7338e8c2a210e1c067aab215495386a531268623313c42a86d423b8a4f443b50
-
Filesize
1.3MB
MD55f89dfd9a6f0c1e7578a6b8262692c50
SHA114b562da23a71a88dde5bcf5a7244ccb0b0a29e0
SHA256a706e7f408c45ea6bdd70f1347099778f553f3ff61e9b2ec69788f6e063d4fa9
SHA512730b8928b6e8a8786a9fc8ffdc01f9dc0e401f012b39f7d6d9219cc69a2504131ed91a24db2d1405348e414950ac8dc7f4da50eac4aff6abe5545e3cd4d95a37
-
Filesize
1.3MB
MD57bb26c306c0b879b5f79ead095b3dcbe
SHA1f9ff72408bc6561cb253eba7a4a84fa02d1abbf9
SHA256e0ca48233134adcb6a364d92cd5fa8f0c867b99803e4a3bec793e5bd0c5ec617
SHA512bc1a1f99795025d7832d61bb1bce84cef14572a69572bbee22a00b6a5f436092d73fc5b5e88da8a8acc1e64ef9e82a446a381f9dc19c4db397f4cf372eef475b
-
Filesize
2.0MB
MD553734c8ccf959b41413d3ad268365c67
SHA1e8772d3bbe13994bfa702ffc816b1f419249ce21
SHA256a7310e0cf624e4b7d5ba4b9afaff3c0bb93c9fe94e63894ab8273b8f5e3c4d08
SHA5120acb0c8eeff7b5f7c66679334bd238ce03d63e5bcbef12762265882aab5a7bb9dfcf19a56a2b0956b32f2ab9657f12a2d367dbab000daa2ce806e9bc71503775
-
Filesize
2.0MB
MD553734c8ccf959b41413d3ad268365c67
SHA1e8772d3bbe13994bfa702ffc816b1f419249ce21
SHA256a7310e0cf624e4b7d5ba4b9afaff3c0bb93c9fe94e63894ab8273b8f5e3c4d08
SHA5120acb0c8eeff7b5f7c66679334bd238ce03d63e5bcbef12762265882aab5a7bb9dfcf19a56a2b0956b32f2ab9657f12a2d367dbab000daa2ce806e9bc71503775
-
Filesize
1.3MB
MD55998aebf9b569cbfec9ba514a0422bc3
SHA1fd4d30861404a415685ec75f6fed0b6d2d9b8eaf
SHA2565d4558cf105cc39b9c18ff85de3a3715ea680bb305ee1b4db6a2d111ce66418e
SHA512e1044dd6eee3766d7e3b234e58609c0701cf310780b0f01e674451067076e25580ce27345972cf6b68e752577dc0de6bea88b2aeb90712ec580684c74224dd07
-
Filesize
1.3MB
MD59c7e66fa0d21385a532fa989fe2b9102
SHA1db72f10ae4ab78f14638c70c357a33597ae9128f
SHA2568df3ba40e6ad1434d39f15a7c9c602a459b0f6b58b77de933a1ad5a887d644c5
SHA51213076d7c4a0c1fc5fecc92d7f884c11fb52f637c1ee82faa6c50189363f0775c19d82190446594f99803b08c5cdacbb62331106d10ab9acf881ac5b5a5abaf90
-
Filesize
1.2MB
MD5fb65cc7caa449af9c02f8c887c3352bf
SHA16ea3c85721354d40d86affa3b68c5b7bac316cf2
SHA2562f008e211bfc22d6863e9d8a6e38bc394a0bc8fe5bdfe34dc28a9c1d341b5d4c
SHA5129e068fa18b4f5a4fa46f5fc48c508febe8605da4455dec527f94a5675cbcb2c1bec474746368421bda81f10f59c4621267c7480e889a643083629924225874ee
-
Filesize
1.3MB
MD59dea1257209b9bd6c163b185a80c0aa3
SHA14b16169c608cfc653e3bb940f1c7bd84dbc7d3b1
SHA25612be3e50d9d2de163005807158be19f8646efc0bb0569ed77ba31cb20f58cf65
SHA5128108af042fc5d19939d5d538dfbaa965edd759f9f6273557b35918c1e09d0a0f6d6e5ddeb8dfa4dd48e607aca4e5dfb840799d0b023b1acc693ae276915aa406
-
Filesize
1.2MB
MD521fad01ab4972330443cda6516c5dbc8
SHA155186b3b9e39bd2f171933034b068ec500d2df1b
SHA256d11e91568eeab30d1c5357c051965227c334f81b9eb13d9d5b6c2fb106a0a8d0
SHA512b7ea704f0922c57f46272c52f698ebc62651441c8c82ed8ac9528b1a52682e9094d91cdcdb1deb9e368b6b5ce92e94353a8dfda050e5510b4cb2b5bea5183465
-
Filesize
1.3MB
MD57f1ecd0d509301aa6677cb2e4997d1be
SHA17b644fc54cabbd4c97fa42d9dc501bf105a1cc08
SHA25634e94e05777ce9a2ebb59921f650a6ba3ad29c33acdc00ea00173262c2c66a73
SHA512c063870c72d1a82f0a7eb82ad043e994a76a28019916c9fc0e496dbe7111f2ec1ca044a898a17434bfceb86d738d7e8e426982d81a1a24693ed4a1f12c9b277c
-
Filesize
1.4MB
MD59642ec8051217f4effc9d94b73fbf669
SHA175e85d437c4c61cbb52b0f30ca8e57ddedd0be9c
SHA256cfcc49c2bc6ada429a9a5b1795779f3010ad9864bdc2f7de38f04dab8b3eab29
SHA5127c047620f395937769d7d5a7873eb975dc1ee497f4d860792b741e066aac6052c424da501e53dd9123cb9978b01f211f8a7aa8ef8a0b9866920803af9e17226e
-
Filesize
1.3MB
MD57bb26c306c0b879b5f79ead095b3dcbe
SHA1f9ff72408bc6561cb253eba7a4a84fa02d1abbf9
SHA256e0ca48233134adcb6a364d92cd5fa8f0c867b99803e4a3bec793e5bd0c5ec617
SHA512bc1a1f99795025d7832d61bb1bce84cef14572a69572bbee22a00b6a5f436092d73fc5b5e88da8a8acc1e64ef9e82a446a381f9dc19c4db397f4cf372eef475b
-
Filesize
1.3MB
MD57bb26c306c0b879b5f79ead095b3dcbe
SHA1f9ff72408bc6561cb253eba7a4a84fa02d1abbf9
SHA256e0ca48233134adcb6a364d92cd5fa8f0c867b99803e4a3bec793e5bd0c5ec617
SHA512bc1a1f99795025d7832d61bb1bce84cef14572a69572bbee22a00b6a5f436092d73fc5b5e88da8a8acc1e64ef9e82a446a381f9dc19c4db397f4cf372eef475b
-
Filesize
1.2MB
MD503cf6592f71c9ac70f3cfedfc92c407d
SHA16b4cc5181a850795ce8eb09e85929db19deda25e
SHA256cd57aeea68e03a7325b48261064ec00e1388a911adf7f75860a46b0e6ebffdd3
SHA5121e556ff0d8fddb56e82e40847fcf90ba61c67a0dc1ff6594a2b22ea3512188ee744cba87c65be4df3901fc92bdc5b39bb684c407db6710f2e4238728acd66b4b
-
Filesize
1.7MB
MD55f2fb084a8e088b924398767dbfd0b18
SHA1e408200dad6a1aec0fe85a7127ce5a78e3baeed1
SHA256eeae487c929b1b6cf2c5e28d2100c57bdb72b0369d029a5478f58ac46c2c7ac2
SHA5126ce89d0ba9eac3e73736ce32658d793f03c91c1a0f6acca2eba68969e877c47c2dc0971fa3c83d646b2dc831e13b4a316d08e88982f81968d8d3f294edfde434
-
Filesize
1.4MB
MD5cd42a8917a24f61994bf5f7866bdc6d3
SHA1449786c43e04eec50a83435baa6a63928cfb5540
SHA256c37a9ad3c72edde92a8b62ca1e5bc62865f4a1c5d32264b15dc5db8d9602c180
SHA5125c630fef09ecfd2163394f686bf2e6d5aa4d18641b4b6b633e432a47d530bd3cb514f2e261def0f31a69fc9b46a8864142df345c2e2102d94444bff15170591b
-
Filesize
2.0MB
MD5e24b241f11fda180141342dc26353909
SHA1b4e1ca0ab4e7ebc23ca8a38d2220b29e868cf65f
SHA256627f32d30a8cf7da6164ff68820028ff6875ea565642415e55d3cde560adefe2
SHA512695da058929da7b0889533391c35b7aa54d7cb83389a56bdb525dbeb07f62e2ab4374f65d84fbd909f6ec673bf12e08decc99c3baaf26a58dc29afddf55c682e
-
Filesize
1.2MB
MD5b2711ec631c34c0bacbf37e6fb113a1c
SHA199827ba93e6bd2f5a6d9bb13fe946c0f562b3c51
SHA256a91342665d6f06a688c86598b677bba4c5caff8e6752c594b6ff1cb747686a4d
SHA5122eb8b6eb37c69df0bdb59e4eb1959e86d830f577dae89cb35a52db6b4c514f5a7338e8c2a210e1c067aab215495386a531268623313c42a86d423b8a4f443b50
-
Filesize
1.3MB
MD55f89dfd9a6f0c1e7578a6b8262692c50
SHA114b562da23a71a88dde5bcf5a7244ccb0b0a29e0
SHA256a706e7f408c45ea6bdd70f1347099778f553f3ff61e9b2ec69788f6e063d4fa9
SHA512730b8928b6e8a8786a9fc8ffdc01f9dc0e401f012b39f7d6d9219cc69a2504131ed91a24db2d1405348e414950ac8dc7f4da50eac4aff6abe5545e3cd4d95a37