Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
91ea4f318d3fa06f4594b3eff3009f861dc5040dc75b7d75f09d1854a237ddcd.exe
Resource
win7-20230712-en
General
-
Target
91ea4f318d3fa06f4594b3eff3009f861dc5040dc75b7d75f09d1854a237ddcd.exe
-
Size
1.4MB
-
MD5
fc5955a2e7fc2c6db8414bb4eab58ecd
-
SHA1
e21d3d958594c34aba7c68cfef79e391e2e1efea
-
SHA256
91ea4f318d3fa06f4594b3eff3009f861dc5040dc75b7d75f09d1854a237ddcd
-
SHA512
494b7a656c8a053dbc89983bfdfb40c6b8a7b081d93b5c6f3a5eefc9fbddcdddc573ed503cdb0e44a19d6177bc551c459c36a9882e09093171a495de8a9dd4be
-
SSDEEP
12288:WrP/aK2vB+5etckdl3yByuGzA3IoqyarOUBOjQWW39Im1AB+Ndn9Ye:WjCKAB0krQyuGAIhMCO9W39V9b
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 1664 alg.exe 4748 elevation_service.exe 2376 elevation_service.exe 2340 maintenanceservice.exe 4920 OSE.EXE 3708 DiagnosticsHub.StandardCollector.Service.exe 2036 fxssvc.exe 3624 msdtc.exe 4880 PerceptionSimulationService.exe 4040 perfhost.exe 2944 locator.exe 1572 SensorDataService.exe 2144 snmptrap.exe 4416 spectrum.exe 892 ssh-agent.exe 4604 TieringEngineService.exe 1936 AgentService.exe 3564 vds.exe 3968 vssvc.exe 2388 wbengine.exe 4960 WmiApSrv.exe 4892 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe 91ea4f318d3fa06f4594b3eff3009f861dc5040dc75b7d75f09d1854a237ddcd.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe elevation_service.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\217c1d77f438357a.bin alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe elevation_service.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe elevation_service.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 676 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2760 91ea4f318d3fa06f4594b3eff3009f861dc5040dc75b7d75f09d1854a237ddcd.exe Token: SeDebugPrivilege 1664 alg.exe Token: SeDebugPrivilege 1664 alg.exe Token: SeDebugPrivilege 1664 alg.exe Token: SeTakeOwnershipPrivilege 4748 elevation_service.exe Token: SeAuditPrivilege 2036 fxssvc.exe Token: SeRestorePrivilege 4604 TieringEngineService.exe Token: SeManageVolumePrivilege 4604 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 1936 AgentService.exe Token: SeBackupPrivilege 3968 vssvc.exe Token: SeRestorePrivilege 3968 vssvc.exe Token: SeAuditPrivilege 3968 vssvc.exe Token: SeBackupPrivilege 2388 wbengine.exe Token: SeRestorePrivilege 2388 wbengine.exe Token: SeSecurityPrivilege 2388 wbengine.exe Token: 33 4892 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4892 SearchIndexer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91ea4f318d3fa06f4594b3eff3009f861dc5040dc75b7d75f09d1854a237ddcd.exe"C:\Users\Admin\AppData\Local\Temp\91ea4f318d3fa06f4594b3eff3009f861dc5040dc75b7d75f09d1854a237ddcd.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2376
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2340
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4920
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4584
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3624
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4880
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:4040
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2944
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
PID:1572
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2144
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
PID:4416
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1592
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:3564
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:4960
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:3116
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 916 920 928 8192 924 8962⤵PID:3792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5bfbec06ab3310e5b6d117bb8d275be7c
SHA1eac3410ff4c03db2fd676db21b04b9156a85a089
SHA2567c83390640331e6584a646153012a1be9427b35913379936e9ff76ef71e0f4aa
SHA5128250e9f7a90102a5702c7005243a6b372eea4aa323bd30443554c47424ba3c146dd8ef6031430b924180fe133701dce9c714e2bb3a900e04d757c862e0f09a32
-
Filesize
1.4MB
MD5ec12506746dc64076fd4736183651b06
SHA1fc2ca4dcfa519e1d5701cf047386df0da5031cd4
SHA256051ecece151b5682d5af679399e64ab5b52f0d478ddefd25f649d5659d46710e
SHA5124fb44e0b6f176d9d76159926f03fa2058b3748f57799da55963bbeff72ff42047d1e16596bbef2038423e0dd75639b2e5f675a56cacb7ccfc67c327828501a77
-
Filesize
1.4MB
MD5ec12506746dc64076fd4736183651b06
SHA1fc2ca4dcfa519e1d5701cf047386df0da5031cd4
SHA256051ecece151b5682d5af679399e64ab5b52f0d478ddefd25f649d5659d46710e
SHA5124fb44e0b6f176d9d76159926f03fa2058b3748f57799da55963bbeff72ff42047d1e16596bbef2038423e0dd75639b2e5f675a56cacb7ccfc67c327828501a77
-
Filesize
1.7MB
MD52e39daf560274a307df349e7da6405b8
SHA11e780f7d0ee9632a2c2ad076c2ea516db7b074ab
SHA2566ea4f0ac94bbea1aa4fb0484982f94a4235cc08fbb647e85041c0c5a905d4d86
SHA512404de62df72c2b1d20fa5765a832da19a9e714359ab2d722df1db87574475841bf95eec4c0637862d6c457f263eb09ec0af72fe815fb6a5f23ef0fd0c8cdfdd4
-
Filesize
1.4MB
MD5f52e150583a8d0883579c5bb733e8756
SHA13ac2eabfe521b467716a5ad37ffbb11c36da6197
SHA25668a0013d1cc57384feee8547069a4a7221a20e2efe1a2493f4c477364942cd25
SHA512e43711c54adbaf769b1e6a1068dddc2c173013f4bd1e7ec2c8396f609c8421211a275860f8388c59b1de99338333c1f6c2bcdd46c67fd12c33d09feac0d0ae1a
-
Filesize
1.1MB
MD5f4a1b5e65944b7a3de52edf48f51d80f
SHA111c4fc3587eab21fe9960403d2bb65bdd7666578
SHA2562a5757e1b0de36e98c1364db1183b01fcdabf65299e22bc65cab121815acdb18
SHA512631a55783d1a5ce1e20aef83d67b1f7e587dcde682776db1221eab8950a47df0d4b4a90c07c474ea6c2d0043856ef77dbd995c1a029e7393322d18e71dc38bbd
-
Filesize
1.2MB
MD560f597087d335101036b2caa1659cea3
SHA157534c155b0588d813178806856dbfa00848ac63
SHA2563a24d5c7007040c23e21886c85096b598965dc761f432a5339ed3a67331ac2c4
SHA5127c3610efa8e050a94b9088ea1b2e80c0fb4199f12895c0d61a271a696e6964b011f098c27c9fb31d3f4e109349c58036b1a090385286db3bde6844a637c9a34c
-
Filesize
1.5MB
MD5569d108d3a62ad5489fb292f6fb7db2b
SHA141396493fa94ea1fa185928d0875cde42ce77011
SHA2569bcc90a2d9453f1e8109413bcfc607c9acaafd936df424a6e47b2abb1136abff
SHA512a21cdbbe919e8e8e996acb80a86b0ff3ed36d2191e3f81e982b40c26700b131dff3eeb3cc20ca471680838bfc495b88a6fcb45996a700cca3ec8050e25d3e2a8
-
Filesize
4.6MB
MD5c1d96381343e17382a2561988c03b751
SHA1e1dd70b90e2495b18b36e1e9f1e459a1d708d05f
SHA25685e24889b51036970b27dce9fe6cad806c7380bfe980698701b57c4f90afd376
SHA5124bad57c2a81782a0bd8d25acdc608f13a00c760080e10b3b5b298914ea6e4cb66cd5d82d04234509ba4d48e921ddb65248b2caada14a2786ce6f32bafcbe8940
-
Filesize
1.6MB
MD552dc524539464fbb95c4044a8193650f
SHA18e86553e580465190c4d1863790a4ff8e5bfb248
SHA2561f047df84e37418578c8e05e78bd0fdcd5a9c0be31b633f688b3a1bf757d7af6
SHA512c1ca412105a119026298a5653641d3f5b56810d50452425da3bd2c4392a626274f90e698e0c1816310d4d845258e153447136d977c0571fd66616e180d607dfc
-
Filesize
24.0MB
MD5fe187d25ad794e7aa418f18a4167db48
SHA1a0dc48dd62efa0f74c1a75f1936530e6bac945c7
SHA25620be4a6363f81f9bcd23de30f52da3ba25c22851ef8fecdc7c96b2f5d23287df
SHA5125af551b99e5b3107daf1d625527ab09e9bd6197d11c2e8e5aaea5f4b32dc263b147251bdcfe9a0878e7106122570b811f0ebe2c6ff534ea25800009b6b2f3dfb
-
Filesize
2.7MB
MD5a596147800ea8373252f7d74b2091a1b
SHA11ee9006cae7dfa399f773a239aa81622687f21ea
SHA256f87144d55850dfbf35b1d902dc14a2ea9819984ea1d85b124bf7072d6a6d33c8
SHA512e571fd472f74e4d712cb29f59e3cf6029d7de21dcaa4ebe6bda18cf36857fe8dcae230d04edb2b34553f05badd2598d493e10b0eed6d504af8e74c584cf03f10
-
Filesize
1.1MB
MD5f469f80012e489e168adb4bc4c34e33d
SHA18f786e6db764b71f92fda8370574d38aef3f47f2
SHA256b6c7f698d3d36dcec653b8fa4b6ea2a34427db1e69c968ae034cabf0eb521a1a
SHA5122c47a34f213ab52fda940cfff4c7d580226abb4800acdd7ff4c9ccad3978eeab7ee5366f4fbf0671c50d8ec93d041505f9411bff5f77a8121e6b650618766658
-
Filesize
1.5MB
MD5115de0d09f54d949040f1c9bb2b76d63
SHA1c1abd996868b5c77f12a36526f36b2af121689ce
SHA25634f7d9400233136e9f035da4d030b121a3fb97def83967d1e6318f4a1d73358c
SHA5123acf80b8753bc7f3b1d932161af2d210aacfb75d2c3ab94386f8198d57110ada22ab2e4fcec7645ccf41f0edfeba707adea4efa59207ff6e03fa8c60279ee1e1
-
Filesize
1.3MB
MD504ed69fd8e02e4fd5d0f9a0d2c9a912a
SHA108c26f509165b1e1e366cf70023c4ee7b8ac48f4
SHA256e89ed8cf9599b5e391e7e3775ddee62361660da093dff0e7f637fbe9cfdd5c19
SHA512fe4fe93c376a6a988b85f2748bb331db6168c81361b710044fda4600b9aea080c9619a88bdddee9493bc6042f18145d02e0def5b78fdb5a25e37715854e6eb7d
-
Filesize
4.8MB
MD5c6dd49e18ac26203b3cf4ca91a6d4648
SHA1d8401ccb325f4c9450cc7f579184033d72c0cd96
SHA256ab20e40ff113a5c0e967d23fb9eed4e99fb7e6856b58d409ebbaf261bb29f5e2
SHA512fd25e70a1ebbc4152d4dc8743ede2bf5ba91928b967a5eece60cd2c3506f1c1c3bc13541a141de6dd7cd1dac81e82437f45a1ea5e7c067a4fc29d9147e3ce4fb
-
Filesize
4.8MB
MD5b3976653685cb8a3e79c0a7f8764ea8e
SHA1941f6d528f73e55e2aecc154c5132f5d0e638efa
SHA256e743aec3a2f5e2b52fe9764fc22fa40afa33991de1cd57196403fad5983c848c
SHA512b72485486d1d0c1d45140723ef63370e0f7139f34c2f03651c8066fe49a2d3b4927cff89290dd7fb58eef4eab3e8e76a6a65e42468c9ffc5c3f1a99fb4ae4887
-
Filesize
2.2MB
MD51c8a60e818d123b15b4130c02606b66d
SHA1c6fb50a07425d5803cd534a6ee23f0deef0f7d60
SHA2560b67591481690747344f17a0897961d2a1a58598d08a5137655cdd3aeb3da17f
SHA512457cc69a27be090dfd4b540fdf7088d39f8e4ef4ced49b37dd2e040aaa20465e29fb774c8bffeda5f7131cb65b5df7a5dd787bcd3259a7e8dac393544d010583
-
Filesize
2.1MB
MD55f99699cd0ffca8f880b42f6318f85e0
SHA196bbd376e7518997ee61130843f8432e89db0c25
SHA256e0a1cdebb41e89e5fe7171e125cb50d3ccb86e777b1808da8a0f3fc4601cfb69
SHA5127a076629aa59c0fbd602caaf3f4e460d12da35cb50945147078cfeac3e3ff8e0902f893b5d93af08aeb69c6661c2f42ad09ccd7de4a82cea4c2ed3e608d541d7
-
Filesize
1.8MB
MD556198300434b2cf83d61f0fe150831d3
SHA16cd18bc5bc12b3c6f39bbbb57801453bb651ace4
SHA2566de81539187a6d16b935542beed84ed1ea8f3383f9091a17219639c0e65bebe9
SHA512c6caa6993a1207c50c833b1b7d0972ecfee6a2ab05c452b3a08c7a53bed0b67ad0d62a9eb7e51403d80778c792f1649db70bbc372421c868c9fa900e90efee8c
-
Filesize
1.5MB
MD5b6f8028bb6d554e5db572b1e2664b59d
SHA1ee6a7bebd49df2c6049e456c7f8185649c9a185f
SHA256946c55f5a4177cb4fa17caf0b95c864ed2ee61fd5d6b2fbb67dea66d1731822e
SHA51235645a81c4228d20d1373054ca35eef067cf66fdc701e23f5889b915ce7d2248342d767d8d267f68aea7cbf1560229b96979e4bfb186c104599a79b76c509b8a
-
Filesize
1.2MB
MD5a5b1cc9c66ca426d1cd07fe1f119180b
SHA1faf01161efe8ea472f56d3ec8070cd5437dedc5f
SHA256c57c2e3b42c1753ecf6a346534bd940058bb8b8b50dedaf002476ef62db46c48
SHA5123dfc2877b20e7c6c7987461e8c6aa81fe4a9ee6153e16db9b4ed0c3197265c930b4719bb393d4e3b68599b569d8332362563bd83f6ff93582c4b9f447a17f1f6
-
Filesize
1.2MB
MD55c4e6ff14eff56a50a23ba02fb33710f
SHA150a555ec21d0a9ab455b3763a9459e39c099bd58
SHA256c158d6ca1099685e8ff95a2ee3d123b651c073aa64a34082bec8b97cee88f94d
SHA512f6fd000aaec4c3150e8127011328d565e8f46e4e91473c9c3b6ebb25a079d38fbff471d8da375ad6eeaf5b90648647b31ee1acaac793d8afe467696d531a09aa
-
Filesize
1.2MB
MD5b5c73c99aa3cc91879d4ecebc07623d1
SHA1c848dc0d2145c9d6108d937446ee8e8bd2224a27
SHA2569f126bec3869ef99975ed69be96d93d968930d08cdcdc6cad4ab4ab31fc42323
SHA512c745f2b8ceb788e11ab6fee862d0d433629b1cae08a90bd79b78bbc6aeaf334c7e2012df0f210debbe56f5bcb67c7b3c6fe768538f865eedf04117b4f562f006
-
Filesize
1.3MB
MD585ab8d3e94587ccc7f3ffb014eaa9de4
SHA187af247080a2ec7e1625716b3d33f6da1e6a0e71
SHA2565e4174605dcdbebdf8ef9d04baf9628a5f18c3a62e4ce691eafed701645b5eeb
SHA5125dd66c7b80211bac0ff8768bfe65209a95163583fcfdad94d6382a9bdc4a59816631942e48dfd846f335dca4f2cab8848578c9977807525218d7bb1959c8fa65
-
Filesize
1.2MB
MD529897b37e3b85afc7630a5b6b1a98c0d
SHA167e45a260d0511421de544885c0550c7550488f5
SHA25643bd0f7f4a1da3729cbd3afea28be5cf2934d8399b213547a58893d8f2296282
SHA51229fc1767b85968cac96673dfa1779aa555faeaef373eeca9150bce2ff14961fca17dcfb6efb14454c4d654fb0b71b9a35275d6244a620ea02a2710aa2876347a
-
Filesize
1.2MB
MD58649e04c4f056f8792f4f41eba4b4272
SHA16b7cebc214c37b8faeee75de2646d25ef691abdf
SHA2561f8ffd821ec32dfe3bb5d9a3a21ed601338f4216295f35028654c7f6283c6152
SHA512b897ad0198ef4e9e36fb062002410c5862255a2196f7ae45a57d4973e207a7264a6840fc7ab615cf9a906f5b4a4814a988ea185ea593fbad5e344f46fd7e85ae
-
Filesize
1.2MB
MD5b40b2e25473c4cf3f1609a3b76fa1570
SHA14089e0567c20ac3814df258a4ae9604e89444d3a
SHA25657040d11a8158397885865d717f9736011266f4764377d1bc97bf720400fa810
SHA5125b3ce5a19389f0ceda6675bfcd0ece3b1da0d04a223716ae53add996195d9ddfb1eb02ff30a65a84565c8c747f076758489d5e2d09b894f1885dda6c86407a4d
-
Filesize
1.4MB
MD57aa5b2f96199769252be77bb0559b76c
SHA1dcd99ea0c690f85e80feb796b1637eef0e335687
SHA256678f10d98252d83f4f6cc76b7651862dd4a68cfa6e658b983395bc9d02c84b56
SHA512af7a2cbab6ea24df5f75cac5e7e3828c5a101785a13cab2b4fae4fb01282b0951a15c7b9f3d9053ab279dc2a8ad5bc427e6ece106b9a368f36de079a99a919ad
-
Filesize
1.2MB
MD506a8404de7a43dd0022319b2e0b53c41
SHA190ca3783c1aae29cce7a47ecc220ccc177a0f7f5
SHA256a8449784fa6e7b8c6a13cfe3e57fc600ccc9a552b229be6e856964544e8f664d
SHA512f101b1472cab29db2032874ab58a6cf607f274cad79616fa101cccdb05a618b14502f8b1bd4358d6918114993b3bb822488344680524af3e8ebc61547461fef1
-
Filesize
1.2MB
MD5368dace6bf07dd0a0b2f1372f0ef17f9
SHA1b77af74d7ecc1128a32a3796e4428896d8052506
SHA2560dcf77a17c319fb148e26d84d857b53d2e987eaf4fbb1bb17f8647c91e891f48
SHA5125bd6afb0b82ceb924565c02693ef2d4b7c585455119e95e54fae9cbfc09ab0336319e5d235683e0d7f1ab277ff76dfd43aadc5cf2b569fddea0a942e1b939b32
-
Filesize
1.3MB
MD569dd5935d4c8c495e4de08061b83e95a
SHA17c5cebb2062f4455502d1df35293883b29b9bfd2
SHA256cf84676a533454540d00d65b1e7ef56781ea2075ca1506270675fedce1952653
SHA512cd07ab5700735fbb30ed751f7f3895cf3a9f0b4fb26fe64d787ab3c11726bf56a1eeecceba8e26cd4d96a17678a25a5b3d6cc11671745b549ab13308dfe30da4
-
Filesize
1.2MB
MD51aa8f0c3e1b06f51a815b50010501ab1
SHA19b9bf8f2334cded285735e9625b1f63ae771e1e8
SHA256fb8e3e8b428cd73717babe6e8762bd32c20b7194d39574af241d3ca6575600ec
SHA512832871a48062cf13ef26d86cfff9bac05e55058faa3676be6e404c560d919cafc02579cfc11f608a05872788d7b46566e37257aaf94a30f7126312f3d6a444f0
-
Filesize
1.2MB
MD55508c97f02b5c576188704b2b8ad865b
SHA1f1d0da247967199ccecbff0c2af0fc47dfe057cf
SHA256dc5a246ffcf6df81d6a52a2e31ab7495b3b165d1a91e516b675d841f09b3f670
SHA512a0d163a860d146a6771703b3f5919aafe96abc6f4a4eea93a1554a40dfe4fc59b7c46c7fef86c8af0f2a35f8c35157939069a9a7ca349670d2e538839f6c6d34
-
Filesize
1.3MB
MD50c1caddc2964793dd39ba048b4b634d9
SHA110b0f5666a76db4db0cd6ebf55c054254925900e
SHA256afba88b533e270610ed05e0539e3d37874b5f86cd054df2cac2d69c5c781d87b
SHA512fd4840da105185542c8442ec406e92e3cdb6d0f0c044486479265c4bf0982dd2172996364050041ce1ac00f7c4415e9317b6df6e6fdc3228e42f72cca91009d5
-
Filesize
1.4MB
MD5f9f6ed56143451c92bd208a45203826f
SHA1ef3b8aa46573b564d7845a9ec61b767db2fa1084
SHA25624d12352edd593d07fa3cab6201a14a90d06dc67d7a83a2966ce70d0b7f55be3
SHA51256874ad2cca4379b40593fe9bd8977ad53b6b28136fcd06588593a5b423cc10fdf5d940532516798a570460f43869e16205097b5c917438c8406c27d707bd114
-
Filesize
1.5MB
MD513fd5e441442d19ee09bc79616f932f0
SHA1284414c17e853a13d1e482750e19905c8ff597d0
SHA256b7da17f80f90a4d89ddfd073d9d0a7755c83e86a66c2f976f2d312e71ebb33cf
SHA512319469dd8375ca6a0f39e26ac0eb6de4abf4be2666996fd50a9d7898a92e1658b9b8928e9576ee4c6968508bae3c843eee2916e43e897b60de52ec58ffffbf47
-
Filesize
1.2MB
MD5df94cfc4ac922be4a000cd68c52760c2
SHA16563c6c9153370827f155cdd8d442e442ec8618f
SHA256fb0ead3f2f3c35e0b5ac3abea4df801b2efa926116cdc7e82f019fb055f5fe81
SHA512c47c54e14213f339b7027810e2b9bf2f943cb86a5414524d484647d83bfa2358b96b585869eca4676f3ca5b1ab1af2ce052a5b284721db40da7c41c5c48b4146
-
Filesize
1.2MB
MD5b18c0aecc6fd531aea48aad249d6a1e9
SHA1d89d02420337867e024b778a884e033cab809e6b
SHA256e123fe09c50b8b519e3c501d06deebecdd939c9125840c4bba5f61b335fbec97
SHA51247dbd8dbb5cc900f32356709421b4ee449da689ec104451a776be54e157b88c1467aaee06b0d514c36535553a10e2923c0b6cfa84b06bc691012bd74e47ba9d9
-
Filesize
1.2MB
MD5ede156ad5b4f085a344f83df4ca4399d
SHA18f0a1cdba0733f65e0b65b762c54f52ed541762f
SHA256f9238b1e416eaa3193210ab433dbe2cbc338df6610f1d4c77c3a7c2e638cbab9
SHA512f2f29bd16a6a54baa2fdf7e778fb53f217adb37997e5f750c30783bcd323dc9056de11f7f6f52ccacdfe6ba9dbe8911bad7304cc966442760a4aceb132e2a973
-
Filesize
1.2MB
MD5ea5ce6df2b747f061cedeec442594358
SHA19db6c85e1c7c9264bb97da78c5cd04076b13d617
SHA256cebc07998a4d322b9541742ac04b1677dafc7ce18834e359b829cffdb0490eae
SHA512289c7eb048cb979feaef089f3cc88016e881da5b162c30b46c24830a7fba0af92fe93cfc0aea02d488dbcdfb592037bdfadf7d551316c01a2853c0c2ea963e10
-
Filesize
1.2MB
MD59f7519621fc2dadfca22fd7d6c61b7ca
SHA110d5127166c66dda5ca1184281242a347872890a
SHA256e46ff96e05550343dff3340677caa09dc7bf1b89abc2ef5bfe17e0a4b317cc23
SHA512b0a2ac8394faddf9ef32cb603cde38bd8394ff88e04fe1522af74e393dcbaf985ee65ef4018acf6848be20bb365c92875aa881da905728da5bb167ad13b37412
-
Filesize
1.2MB
MD573e2dae70b373d5faf06bdb2edf85c11
SHA15324131d643bb206a3bf6d25e51ba40bf960a0cf
SHA2565771e91fd91465cfaea1b2ba6e3e3992041edca1ebcfaea74bbf0fee2874ff8b
SHA512dfc6061f2ca9a83eeb540f1a80590fdb2389c5b8693107ca127b3a80e631ba749c34034678f892101d9912ac3c941031dce06eefee02b7fdd47dafedbdce6b11
-
Filesize
1.2MB
MD5a9b64529d9d7af8cc72640d996dda227
SHA1458edf976e5a1201018d06f70ff2a0e367d3b6aa
SHA256b2869908e4dc3312625e977f87444d75ad965f7137c27d0fb710fb5305faf715
SHA512beb6533ac9f3a88b719b6aaccc9c03a45bebdf1dc5f4eb11543ea0dee9d713a3839aed87d2a1b7709720094344fb49a63a64671c69a5a16c46368c984d3446c8
-
Filesize
1.2MB
MD5af8be6f34e7b086997dc08b365db990a
SHA11ba57002f334bfbfe2127125889929766314337f
SHA256f4b874656563bf203cf310d9af37a569235db21aee303bb11057075411b60315
SHA512be91a19a13a3ddcc3ba30d7343cc53c64996d84021e0c0b8ad47c130b3ca67061d1fceb5e6fb456cd1a783e36e3de386a176e4fb29d14cc3d80f1e6937fcd2d0
-
Filesize
1.7MB
MD5869ab0a938b21a6790ab2e428e4f3d56
SHA17ce322dd536a5a7264112927767492564526ece2
SHA25698602c2accc8be51f04d3c81a312afa6531e6516a713b1ff80f4175fc8fba0ef
SHA51286cf0d2c580ece91f5d48e9488954823d7273d03eb38a522e0e6171d0ddcc19d22cb9aeb6083a812bd34e258994f609b6afef219eab772eb2304702dd23149de
-
Filesize
1.3MB
MD5f15e9897afd41bc754698237b87169e8
SHA1a4be21b7e0b396c7a588eceaf841827da4de3a41
SHA25602210a7267cf6a572d28b9faac5d1783db70fb67f489cad07e979a9bf6343a4b
SHA51254fe5241a4c13ec4e3c7e9e3680094cf21e35d7abbd70a2855571f4c4baabcf9c9347bae89102e799102eb7c78aa0b7a6063703d6d9b1240b416b91204e7e3a4
-
Filesize
1.2MB
MD507ada5038d7dd0b9e2c6a1e689dd40ed
SHA159475ce77b31893d82c326d2b3d913ccc6e2d0dc
SHA256e91c43fcf8917f2800026fc6524a87b5cdee92ba24122ebf15b3dcb9e5d14c5a
SHA51260fec66ca50670432a0569971b319997a9177556a73117bbab6dc959bca77f061b39d771a41978d475ec05fec8d76c2b270de6d49a93f40895c60dcef3d2a6fa
-
Filesize
1.2MB
MD539cc6f3f3515e19abc23c259e2871339
SHA12dcadebcabac5d6b12c402b43afc5b86ffe78446
SHA256065ad56eeff75f0cd5449e75fa4cb54bd4dc4bccf08a2195be0f8f342417fb74
SHA512793e93827a4cfd381e0f95473003b214a8234c24e8634b86af50e8fc982f0dd22408c6faf0e813c3f00cd45a82652e104d709d5e27b9769281e2aca264ede4d1
-
Filesize
1.6MB
MD56cde7b5b1161cd2ccf2e52559dc7c841
SHA19336dbaa9b8bc500efd6b526b51b7fee5fdfe453
SHA25671907efee87ab6deefcf611b1688cdebc12ac44327fdd3eb6ca7d99216d1e0c8
SHA51200029526fc74b1639daa2b5d37bbe6657756b37a10e47bef0da2e7313c9fc8acaec84f032392a6fad1b9c9e01ad0229726c2f5610edcb2c84514225e06cce6d0
-
Filesize
1.6MB
MD56cde7b5b1161cd2ccf2e52559dc7c841
SHA19336dbaa9b8bc500efd6b526b51b7fee5fdfe453
SHA25671907efee87ab6deefcf611b1688cdebc12ac44327fdd3eb6ca7d99216d1e0c8
SHA51200029526fc74b1639daa2b5d37bbe6657756b37a10e47bef0da2e7313c9fc8acaec84f032392a6fad1b9c9e01ad0229726c2f5610edcb2c84514225e06cce6d0
-
Filesize
1.3MB
MD5aa908e71b2119539037c48de45d562aa
SHA10a1415a81e2b0fe5bc092ce48891e7a15b96e984
SHA2566e57d40618200bae76d03fbec2427f5e7b70a05a3b3bc83cd2c6a245afc3f391
SHA512c488e88cd51a7fd369d263b328e95c26627196c2e5034f2c9c7b6c18eeab6b1c5af3cb89dfd59bbedb68fee7617247fde2dcf2f151f1888e8708236242f37bc2
-
Filesize
1.4MB
MD50463a389f8c1cb73608449537261a764
SHA107f0dba3286d553a75bce3f25e2b78f83d7857e9
SHA256368df0a9c32af7aaf94e81e9453d518edf76f465fa516e3a8a3cdd81f42506ab
SHA5123249e02b15873bfbd50640ddc2956b76411c0ef3f04154b8e2358ef26908bc04cf53b82bc90cf285c2aeb46c9d67e9e1a2c20f4f263e592cd899b7a5e379a8b9
-
Filesize
1.8MB
MD54ccb138374d1ba9fc7d6ec34fa63b7c5
SHA15ac3473ebdd0237167044814bc94a16a013f9b72
SHA256df00e124ea315020b2f736e4329b0fb60b8a0b2d5c25a1397bb036710cc74d20
SHA5128b9c3ea4fad013702d36bb725738eca76b7e5063d3f909ec7bc1d627464da6daff02894913ac133bc156cfc1a66986c3d1962c082f90f0ccb147a28b54a18927
-
Filesize
1.4MB
MD55e848cdb297fc2040221e794190b5a2c
SHA18cecc7e1495029e2c70f6b11183b417932305b4f
SHA2566bec319e82db34048ff5cf5da869517e5b2eb5c86214ffd137ece56a954ab098
SHA51288a8c143b94b25f48d698d1755c3fa2918138d4cae58bc40364eec0702d3a1df29d384f026c5058012871b0fd4666b73802e0b6d8f690ff678440f64ce4ca32a
-
Filesize
1.5MB
MD5277a9252264bdf37b60507c0a0f9aae7
SHA1aefc4a0339e65dd6793d62be82b24d1945f1620f
SHA256c03b197d2dc7e0666573c9884a7e53a60fa696173019c0f71e5479d2246681a5
SHA512cb242fc1f5e0298c47e053151f2612922d5eb0c9cf529920403381e0b1a2b46960f2e84ab8442ee8a9199de13c4c6558fd96a2a6fb8b4452b6b58189130825e0
-
Filesize
2.0MB
MD5d4ab82b066f061be3362185bde6f85f4
SHA17c3fe30561ff5ee7650acb9767037cfc3a0194c3
SHA25699694668bbbdb54719f60feaaa2409a649c1a089805b3f6f95b6be9c4d4b2185
SHA512c704ef471be6603a7cd11996a5113378d99b871382cc1897239a84e5f8a419456ab498a52fccb89bdc72175a1eb46f11d50147bc560044499d3621428c015e47
-
Filesize
1.3MB
MD501709aee51383163cffb137267a7cb78
SHA1ce1cb6e4284725b3620c9054bf29c8d623b5caf5
SHA25678b40e427f84bf4f01befa42498f7d9ed318590164b56d16e53c7c4d6c48336e
SHA512af12b1e622523f226a611b2d3f683992265368fc040dc46458c2f843ff0604d9ed2d897ac311bf4fb42b5943ffb1759d17d3d2c302bbe6afe9109d9f74f4cf97
-
Filesize
1.4MB
MD5cf699d167db75c7b77643c1ddfaffb6d
SHA1d46d70d8a81db336c2d29619584c795053a8c45a
SHA256e2b8ab58f424f50b1c30f38765962a2e47580a5840280d8176cfa6b846fa6faf
SHA512a1f2060ac6cf47d007de3b709923da3b4c5f00d89b9dc7877706088e424f149c51cfc01dd0e1023602bb7b5cc30c69ee6d6594661c1b97ea004f210bab3fbe10
-
Filesize
1.2MB
MD59e9c020d72d6cf492efac4f26add8352
SHA146684341977a950e322bf1d11afba83d9d3f4f7a
SHA256e6b1969d857da3fd4c5eb2368d3f7532ed3b34ff2dfc54aa79fab0c9ce581520
SHA512d3f27871e80365b6694d95caa9e173c4278ddebe2566281372ddf512cec5295166091e8d2537a9d07909b50b2fd1a871b6a496c712602dc375dcbfc2547e9f6a
-
Filesize
1.3MB
MD5fd94d65339fa11c2a5a303f5114e5147
SHA18b02cdf78514751858b8a1da6ff360dbee48eb5d
SHA256dd1f2158c0185f801bd62bb1d4b93a579b77c6dfa88c679dd11d13d7ba328ec1
SHA51293fc6fefe96b1b498ce1bab23d5acf87af659bb54d3802a56d266ad740c435e26cf5a37f6b3c7269f5cd1ad0b9976fe6288bb7a9d8618b49a56c7f848f8aacae
-
Filesize
1.4MB
MD557eff306f215e7db4dc3b014488e11e5
SHA197ffeee7df69220e658e81b09765c64269457c5b
SHA256bca9d2ab4ebb31e0a18e4b79da37c94a984e7c7d1349e29ffa4b4bfdae0aabe1
SHA5125575e04fbd8bbc0b76d35204d34ee213c5bfc5994484f9b202064d59c27b3f55be70d7e1177b48572666178d23bfa1fba11b6bb50f4dcfc51ba1c082a8b0a916
-
Filesize
2.1MB
MD5de2eef442ad21d72c58e874f74dfc8c0
SHA10d2abd0a15808760eca94e674c5c052c9af4fc68
SHA256a646b3afce7c4ecb9d9d16f60677867283e0988ffd6e0d424e1dd3a6818b4018
SHA512fc8e537de212e4cd2a3fcbf2e576052463851680a6f8466eb8dd8d9a09442396649190b4c5da5f37add0d88fdd10b445231c0b4d354e0cf8f5a6e8576d50a5d1
-
Filesize
5.6MB
MD5150b229136e0c6caf0ebf05c839c802c
SHA102c3fb0a3f282fc3008c99727289bd2f5b33955d
SHA256391af1066023735afeb356b4becf8e8c55cf9cb83aff97c83073a46e591a54e3
SHA5127049191689a10b4458e48816cdfd89a9a2af83067d5620b396c9fb1d5888b1d3fecad99997c4a533275332e0d6119318a4c4c15665a92e683b23f953e10c80a6