Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe
-
Size
5.8MB
-
MD5
54f2c9e4eb52fdf31a77bb74d78f94f0
-
SHA1
2bbc74dd967174152c48f15f2803da2f041f1aa8
-
SHA256
6abc61d13cded9213dcae47aa1449914f584ee349945a2228d1400d03532dcfb
-
SHA512
aa6b4e5daf37ee7699168f63d60eac4b1823d2d443511e3eda834c925132586ee6fa8fec1b4fc898f29dcf88eaaf2e55c156b13afe927abae851883bda6d0797
-
SSDEEP
98304:DNDwSlUk9KPsUxfAdNmTVi+qkPZKOBuyaoY7cjGi+pFtFR:D1Uk9KmdNmTsOBuyaopjG7
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
Processes:
alg.exeDiagnosticsHub.StandardCollector.Service.exefxssvc.exeelevation_service.exeelevation_service.exemaintenanceservice.exemsdtc.exeOSE.EXEpid process 4572 alg.exe 4684 DiagnosticsHub.StandardCollector.Service.exe 1724 fxssvc.exe 2180 elevation_service.exe 1248 elevation_service.exe 2604 maintenanceservice.exe 720 msdtc.exe 2708 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 17 IoCs
Processes:
54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exealg.exemsdtc.exeDiagnosticsHub.StandardCollector.Service.exedescription ioc process File opened for modification C:\Windows\system32\fxssvc.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\alg.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AppVClient.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b4a1a1d6b3e2edcd.bin alg.exe File opened for modification C:\Windows\System32\msdtc.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe File opened for modification C:\Windows\system32\msiexec.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
Processes:
alg.exeDiagnosticsHub.StandardCollector.Service.exedescription ioc process File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7zG.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\dotnet\dotnet.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{1342F81A-D5C5-42B4-A5E8-933F7759DA30}\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe -
Drops file in Windows directory 4 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exe54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exealg.exemsdtc.exedescription ioc process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
fxssvc.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
DiagnosticsHub.StandardCollector.Service.exepid process 4684 DiagnosticsHub.StandardCollector.Service.exe 4684 DiagnosticsHub.StandardCollector.Service.exe 4684 DiagnosticsHub.StandardCollector.Service.exe 4684 DiagnosticsHub.StandardCollector.Service.exe 4684 DiagnosticsHub.StandardCollector.Service.exe 4684 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 668 668 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exefxssvc.exealg.exeDiagnosticsHub.StandardCollector.Service.exedescription pid process Token: SeTakeOwnershipPrivilege 3968 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe Token: SeAuditPrivilege 1724 fxssvc.exe Token: SeDebugPrivilege 4572 alg.exe Token: SeDebugPrivilege 4572 alg.exe Token: SeDebugPrivilege 4572 alg.exe Token: SeDebugPrivilege 4684 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exepid process 3968 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exepid process 3968 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exedescription pid process target process PID 3968 wrote to memory of 2916 3968 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe PID 3968 wrote to memory of 2916 3968 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe PID 3968 wrote to memory of 2916 3968 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe 54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54f2c9e4eb52fdf31a77bb74d78f94f0_NeikiAnalytics.exe" --type=collab-renderer --proc=39682⤵PID:2916
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1616
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2180
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1248
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2604
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:720
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5cab415e4a383a5dc39df130d7bcdf1ae
SHA15b7f5b879f47b46ef874d5a2c78063f5816123d0
SHA2567bfe6b761a63db99b19e2ef5796e571d948615e6d3ec1f51e6f253102bd75a2b
SHA5127c328addb28fec325b42c66cb21be8f7ba35432b1dc78da83f28791a3dfd773e6f23d208ce7b7c45385d1111140bfc6f5e657585f1b774268ea00f91a630e690
-
Filesize
1.4MB
MD5378514f374f0d4cefd176604f3eb5e35
SHA1184e19fe11f5088c8370f608adff5648f7552a2b
SHA256e05bcce63a9c9640b3948029d6554802a6191a9e869bc176eeea09a299e381b7
SHA512f38b375ed0977f8a12ef7be7c070464fe01acb86dae8093282ba2d43f13b7e0724cdc026b03c654094c8fa30f3f3d6adf10a5954c08c10fd0a9a2680d1b0f25d
-
Filesize
1.7MB
MD506439b8161287c04f9c45fcf2c2a549b
SHA1715cfca76ce764e1ecd60f55a933f91d7c82fc15
SHA2564b09567e17ffcda312bb574acf31c791eb090df8b5f7d8fa1ce29201d0bf992b
SHA5121fc54c563ddd17b815ca877ff3b1dd2bc11e082c8db411f9e72802dbf60ec86f340ed01891e8752151015f6c34cea650abecf30a7972f76c1ed84c4bc5a23321
-
Filesize
1.5MB
MD5f0d04fe12817d52341c2a795e2a6a382
SHA12e00e2b18aea04476c1b4f473424da2682caea86
SHA256f63da9bd5ceffdad34cbed4ab8d423fb9bde9b59b09db118ac52dc43cb9ee50d
SHA512771eb9b1625d4e9a511eba01cecb334328a5d5be1657ac390a50252e54cb9ace47a504d7adb539b8a0bf50ca011f96e7d906a1243af526b8f6f7ccd8b924c6e5
-
Filesize
1.2MB
MD5c278d1a5ac9268f18d371966c08f8c3d
SHA1d69b9d42e37e533c03cbd042b53d3884da07dfcf
SHA256f27ac641a34e3c3caf44ed6804081e9e15eef842097ed29bf0b7f57c842eb574
SHA512fe5bbbbfd95aed8b913249dcee7994ad6b74e65a89240292dbbbe5315ae216ead699a85b1511847ec6217029fe141fc0c7b25e01cc21b374751d8be7ce91edac
-
Filesize
1.2MB
MD538617038eda41890b77a0a5174641d7e
SHA14373760f910591b7065c19b70d2ae5d92cf60a5e
SHA2566743caadae36073f0a75e24828122f615b8cec4c3075c40a5034d9e9bce9f418
SHA5127a4486609aaba1b9e60d0d4a902d979823f36d1d04a0fb9b8633eab9c4e4ba1f8ba7885ec8ac000a6cf2f9e0051c34266ec699ce2ec073e13a3d9008ec67a479
-
Filesize
1.4MB
MD5155739c390602f85acb850c4f11f35a0
SHA1e0387028f428f7c03ef4ac6239df2590f71b566b
SHA256d962b69103c0012da573dc364728436188a7bce8f20ef43385ba11350c3a6790
SHA512327cd491e6a3d6b514ceb98ed89591b357f44870a01d88a4fc7464bc2b8233629f41f3c58456bce12529bacac50681c4f5d5e30eceedcfccc00688e70bfdf162
-
Filesize
4.6MB
MD547646d10b6a73ee2c93fc78490235b4f
SHA12a7760956be5db2f172f96968f5413c80ef41597
SHA2564de33ca7fda2eaf7748d4b8f250a8cb1d1910dd0a0010bbea62bb0317c386ae2
SHA512e38fe616f92b3535870e76e0252df8c78256f83e1e061bb467fbc1975c370c7ef73a33a6662a8ac3d0260247b96c8ac279e1009c5812e06825fe172e536ba5f1
-
Filesize
1.5MB
MD5335e4f0852c312cfc1956f719d94b80d
SHA16d13afd8e2d8677d90b72060ddc19d6d6517c267
SHA2568fc8e9bac8b9d8ce2b6b82f48bc6dae5c643db338cb2579bef68cb1f4427af27
SHA5127c799f6e64031393691dcba86fd0f64a3e2ef569443c11f1a1c9f6972b1fd267b385d01ff342f0544c3e0d66f96b6d496666d68f7fe6a9f977e4a357f4725f64
-
Filesize
24.0MB
MD5a422ac759be45a9eef38c262c0721ec7
SHA11f62ab55983a23f892d9c99a0d63ad7446c636bc
SHA2564ce1c635279c391e58f17d59548de4b53542b4d984daa399f68a44a5a8cbf27e
SHA5129f59f3edd89ba9eb17b30c5529d20a89a147a391f8b4325ee11b3a8317fb303e47b8f2ebd9468b45aa24a38aae34c86ac5e02bd2840530c24eac97997de5628c
-
Filesize
2.7MB
MD5229fe544df0e458fb8de6b2590e7903e
SHA109f1fffd27ed697cf223efee59ef1982fe9677d5
SHA2565b8122d54017ce6830c7576b0f9d51560ef19a3fea7ed303b8dd453f43c31dbf
SHA512e9e3af5ccefd06febbf59b050ffbc978c441a46ccee5abd10d49b6ea63c82473f02445097fabf91f16f1c1af3f6e393dbb830a714c7acafdd80aca5307a7193b
-
Filesize
1.1MB
MD58784ce0a77157dcd7fa3a5dd06f7634a
SHA1a1dcac24e1357ea9c6c9b8299ac286bf304acbbc
SHA2563227c7c22ec85f42f5960b65a011b80a1f8b7470cc3564310024c0f51b7211e3
SHA512486f92bcd27e188e9136f8f6746a28d78b478886e4b499167677b9920e9ab9954d6badd6d66fa2f5f80f71e1a391a9f6da5c5611f3f3eab0468f998f58e881e1
-
Filesize
1.4MB
MD5d271b5b8c2bbf603beb920bfc8ee35c7
SHA1146a7b6d7983c032640b7848082598f9d2116c50
SHA256c6546fc7f5c8189af26f355b4fc3a26f3bede7deebc8a79284fe6db2605bda17
SHA512cce8a8c53d366f6caa5573fa99db82d89b723d57840fa5588e57c58988507403ee3fdeee048e5d52d0e2a8974ce4d1f66ae4f7075d37536580c5ad3cbe029366
-
Filesize
1.3MB
MD5304c49f7094e57c44d62cf57e1ff467a
SHA18360af9554781d850468d23f4ea2b848402825ca
SHA256fc08d4e0ae232a47c956fa65ec3eca2c9b7dcf7f4f502421aae668fd4a869bb9
SHA5127b1818e438892696bde73c1978e47596c14849ce906be8ae415cd6fcdccde6cc7697a4752d1883cbcc7e6fd486de2b335d48f542f91bcc39a0a44b5e0d87b572
-
Filesize
4.8MB
MD5351e860f66842692a188334fa138dec3
SHA17904028ea6551a4417294a01ba4921c9bfbaed99
SHA2569521147fbefd4995bf83fcd181c5f86710e66d2b2f8abe8f3eb5f0e3ad73a3a1
SHA5127d9a5ede116ba6a70b5f582eb3dab1b7749a3e7917f71242289663afd3904472707d2a497ec997a6eb58d90c6cfdeb465222a45974d1565d6c6e8f3bc1380238
-
Filesize
4.8MB
MD5954a08b77d777ceb001fcc70d8d450a8
SHA197fff9eb20ad8f1c819285f2d9d7a0b3e87f7bac
SHA25697955f0bab790c4fb09133cfa66e05590d9c5d7e63d75d481e5de99354560d85
SHA51276a8080d9ab4823c8b94bd12ed8251afb1b303f999f1f61ba0af65c3c1a7fef1d914a45b8c124a8a0a0b0028cb81bce22cf9994a07b0de90026fcdbc7abc18d5
-
Filesize
2.2MB
MD5b10f18a1cb95309f7957f20aedb63a53
SHA1103beedb1f32d4baa2b650ac8494835664d8a877
SHA256728830193c1c10d5670a7bc27dda84d8c49497ddea794c82391fde7d5a84830f
SHA512d4a9ca95c2a809059661dd96abb8e81516157f1ae75a16d8d76a4f6333befb5ce0e530d36b72d9bf5cf118443cac56f397fab962bef8ed8e1902a802098d1a29
-
Filesize
2.1MB
MD5317037621d006c65d193c574dcc17d4a
SHA155bf3331a86ab8aa0218226a3c783fd6a2afbb8a
SHA2562a8e551d8dc0759a40466accd485af4dc28b216ee51f70e056ae9b03a5c9ed25
SHA512d5f73f345bcc9435f9668761ec1f598c70da7ce4c4f06f3ea676de21c163f190243676b53c4d2552e5f452310f1d79f5c08faeef53ec3d1befa7e7a0b4fb1a7b
-
Filesize
1.8MB
MD52a25397184bf0b76a6df70d12b6c0811
SHA1028bea537a51a416428572614b6438513806d270
SHA256b0416ed415104921f0909b8d9590da334437b73006bebcc5cd4aa9c6c3f638ca
SHA512c3d709e263d71baa44849d6fd74ca1ea57a1e8368a4c0eeb230963dea8d4221d5d524333f65c20fdb973a9240aeb23f0d954a589dfe85fa4fcfa3fd145dd7b23
-
Filesize
1.5MB
MD5cec2df78ff66539ab6f9dfa90ca5682c
SHA1f6a3c468b0f00e27bbfc49cb5cb6a018fd0100f7
SHA256898f70d25d851373ca87dfffa33003deb199d4ab0072b62546706e6293b11769
SHA5122c682df639474f0c11a1d76b879d901fb377b9f9e14b96b034fe521446c326b10c7a248ed8dad4b4339e60b673ccb0918d531e744f8fbe2c918ae5dd2f1830bb
-
Filesize
1.2MB
MD569c81713c969d05b8c92aafc29e69f3d
SHA1e64e087ffa8c562905f347343e99f0ea4087e5d3
SHA256abc5b4a8ddb257309c693e6886860e8181bb80513de8fec0d3d0b34648abe43a
SHA512a5807ddc7eb7c492d4a238e88ed075c86986905a7550ef800e4a5c2abd9a5586665e50c1e7ead354b6325812317e9ea49fb07976d2bf448cc49513ad5b0837fe
-
Filesize
1.2MB
MD54a0854042e97d32a07002186fcdfd665
SHA1874d02e05ac07e90f48512c6410b96ff2aa36171
SHA256271783cd606086a199c1e2a7b984bd5b26e812d461b959c0629c808a6ba772c6
SHA512f96b2a579225bfc5e8e6797e1e100a21521fd79099956b54ef05ac73780fdc71e4e4990d4400d75460d2a44300344ff9b93c0a010ec44a42605b450e3e67d35e
-
Filesize
1.2MB
MD5772180f63e691045f723be62f9cb6c9b
SHA1ffd428927f63359cc57557cc95db611e2fdefe97
SHA256564f31c722ebdf8f8e700e2aae74ab9a565d90fe71f62da6eb7187467329e799
SHA512e27ad2c9a756e76e1db97755ac5a470d308f5f9285058b5e1293fb62b3c53e1c9221bbdd09a13013c91ced44aad470642c2b561288a05b5961aac762046b1133
-
Filesize
1.2MB
MD5d3e3e3c7cfdbb0974b1096db4fae396c
SHA14635a0d3bc37db4ed5391ab35d5b662fb5a29ca6
SHA256f63a811c85a40c78834ef0d9f367d2bcca8c281845cb9ad334aa8cfc4f7d040d
SHA512faa651e1490d80526aa0adfa082bab36ec36de22368a64f4c031c34b9d0f64eb768a4366b79f8c1c8ea7407fdab1b24723c2f89708a2265184461b52d0cfd364
-
Filesize
1.2MB
MD52ce0f00ed707e5bf71fbcba1a93a967c
SHA1ab4809234af73ac026178e59e445a2edde2be396
SHA25671cce5e2f6fea3ed97fb92eb4a60a37abe90e6c28216b39ac6d8902da2abb553
SHA512c053c6664ac589e655b0880ec77e0b72345da8ceb53c1850b48bd73a43557ebc000ee8dc3d4ba546d108c3fbf18fbd76941c0d5954a5104efcd51af96e6530bd
-
Filesize
1.2MB
MD5915139cc3743c6097b744426cc3a36e7
SHA16c32e888f0a74c7c2dc5f23c823f42306629fa8f
SHA256baba90fd5d4638c7ac3530e85a707c0c8696c647c6c866537082f6dd1f5fc713
SHA5129f3076d7c160296c1f9698075fe07b355d7b4293159250f705d1e928f39845a9bdf7a1c2464f81d473729650b751a4ea49f4112a9b0f386aa6b7d147b731ec51
-
Filesize
1.2MB
MD58d23b0be5f09daba69181a49d37f935d
SHA106f4258df0d7a867415320fe61228c107298015c
SHA25659f4bf6132cb4b21d094e5b865cf8ebd3b389671b22d3cf50c01b31dce27f7ec
SHA512b69ddf0b3f01e9e15e9513215fe1f3ee0df5b4d69c25cb98e356cf827142e6e5d8a34c129fc1f3bf8a4eb532434d177fa193da26d0afd686b288748483944304
-
Filesize
1.4MB
MD512ff837e95b7810c8f63e67ccea81f49
SHA1769e8540f435075a0408b4e04f799b39585bcee7
SHA25603139c05e94a0bb41b961aad92633a01bd2c500cb1547e2fcf6a6ada7e2d5b1f
SHA512ac1084a42b50dd271228c7ff9d7ac63538d6178b8c2297ecfb79b51626d3130319608444746ea6446e6f24a9f4ff9906ac5f96f9ff1d795f16f384666eb74207
-
Filesize
1.2MB
MD5409c607baeb2de40f28178c289e84e53
SHA1a9a32602555fba2bfbc77ef74c141f72ecefdbb0
SHA2560fd8adee9047dedf7c94289b2460a6003a8de2c93625544fa5949baf5102623b
SHA512a04726ef45846f67c85be5f9fa44d7ac4482b0af8a657ef78281d2b082f41ad83d5a3ac03296bac330699e0ccaa88dd96e26a67a53f246a019fc40e514d5ea23
-
Filesize
1.2MB
MD5ffd6e6b2f915cfa3041d102bcc1819a2
SHA1aa42e3c3b2a16a037b1579ba1bb763fa04ded0d4
SHA2560b858edcb5e9dc6817b52bc7245e0fb252733d51b7c44e3328a470905febdd78
SHA5126121e158ad990c10c654fb5ae3a22427919b993b10107c3ad572029d6baa6c6ebd7f4c7cfb7bc905e3a402353bc292e4147bf11bdc5a1154d7c7b3c0e2b07a11
-
Filesize
1.3MB
MD5bcb95d6897f356fdd8f563a2b309e363
SHA141d0ccd3c5554b14c493fb6336deba13115da245
SHA2569419dc33789c787a9623bdd3b273927e7a76556f545a9170f76823f2af460a41
SHA5129082bf4873121c2f045593a27813851b99cce150fbbce8acac8214825190b7da42d86c09e0931764a5bc54a11214552ac505f71539476862b84b0b4c6623c930
-
Filesize
1.2MB
MD5613382575a3d6c4e28509ad480bc28b8
SHA1240328e60f652aec82f32f25d8bf1865d8c2c420
SHA2567213b57f7a9c00d2bb99031663f99c731599313f889e28dca4b782c48b277d88
SHA512cb62e96872502c1c4fa74e6482ad756ac72508b831c95e49d7ecd706a88421622a0448f4f082d7488f8f7ced0f907c23e356a5db31257e214e4da4df1182fe2e
-
Filesize
1.2MB
MD508621c4362eb82f9dc1a7cb8ee7d22dd
SHA17b68deac0f0e54a6377b9ca094be3ddf8d13cee8
SHA256cc874a97b77e605ca7a0a5c0cc62bf89fa1e80f1365fcefc773331273f5642e2
SHA512416fcf575021f0ae4fdf750ac7c32f2c7eddac0ba169db297d521646874a2bd1cf45faf90217a6531d6cc5a1bc9c8aac8fae49451f3eed27376707be66ccacce
-
Filesize
1.3MB
MD5c45a36e5d9fea2409d1153855bbabed5
SHA11b1bc682f23e6ba35922f37849af61ae48f48a29
SHA256d5001c8dc6c5046377d5b4d308d11abeab9d2345595a96197c1616757c2aadc2
SHA5129072b85f46239e0b177c42c79a76a74c19b4ec8bdd9bcb214bb0ae6c8aaa45a43316f139a07b098bc2399881845afba354ab078ddf42216afbd26edee3ec44dd
-
Filesize
1.4MB
MD539a4ef3dbc7951a33ba21d4f129926cf
SHA151682d51dca52a012360f314410a79d816623db8
SHA2568fbe45d37b0a0dde4e60b42a5dfa8f2ec2d3647289c25c05ce8af0db4d968cf8
SHA51240207795944117b1fab9b024f2800871ce0588e1cec182f6a4d37fccb71a467159c6f62e65779a248da5c7863bb9906184adcd7ec286490f5486fb90f0f95b3d
-
Filesize
1.6MB
MD52c9f6d8bf6a7707eeda0daa5085628a3
SHA14cc5bc614fca3bae5f1174e0a3ca1069df4f2c6b
SHA256d88b224b4adfbc6ece6fea18d0f19874db7a5e1adc2e553597ac0598fa12fca3
SHA512d3b677aec3c8f1f4613e218b558554026d40ba3722af246f84cc72128c47e2d396d79a7d85c76884b4606138b05911b9ce80c97ab5de287d8351346d2934336d
-
Filesize
1.2MB
MD57c936f6c53da2658d879f3434d455c67
SHA15ddc0d1dfb982583a6e8a9db881fda4513128e23
SHA256fee5e34a510714ea5dc3519bb3ce1a552ce3e6f0eac01dcf58fed09029208697
SHA51282a1422d0097b515b454a5b0b2e5c125e1dc7e6c1b2ceb44072d70ff0433421a9f0fb304d0948ef7a09f57584079bbe3f197e70bdac4e2ec3a9922637cba5af0
-
Filesize
1.2MB
MD543b5b63f5e33d8cdebb9a8beeefedacb
SHA120e6d9a813ad9952a529d6ea32707fbe50b1fb88
SHA25628a9c3b31624d445d83114a79ba7eecd2f38f0641625bfcc689ba67a6b114504
SHA5126c2b671d78b18dd26547577e4726063527637849673c636691189c321d63a656a0b088f6f683dc28edf89c5929fc58db89b4f8db1d9d52d40dc8089013f50933
-
Filesize
1.2MB
MD5e37f3a4da035d2ebd31dc6a6ea68a6e0
SHA1c708d3443e27ed128fcba63bcef5304c99a8babd
SHA25639243f7de401eb37910a60b6a86b78054c6adb0579f0cde3fcb0b6a5aa2f4751
SHA512f0ef99e11ad5a9113302b30c15e6ccfe8ead44b8c84224be108ae4d1184e3d32497e2ef5b23dcbbe7bb899965839b107dd27354550138feeaa7d606a1597905d
-
Filesize
1.2MB
MD5fb9a5eb5a4d0b06681f2280cfbd917eb
SHA1a6fc235d2008b0f23773a4cb4f8945c9fbd0d3bb
SHA25644d85f4534c89d7893a9f5f9811e5f843755dcfdea76a45c6b28ea067640d61a
SHA5123f8033a381107287cb1e0edfcc89d2f129fe6065717a1eb6d8f091ad74201040e4207fd9df43bdf3dd083e5cb89d032b45e804b5d44384552a2d1e2ddcaa73e3
-
Filesize
1.2MB
MD5fe9be1efbf8ffbb60148600249e1a954
SHA1a508b7c6c5634adfb210d6ba1059f09be3576510
SHA256586e6c6d42a2639cc1d6f5470644bbf02f61ce73d4a18ea84314f94914945187
SHA512d927aabc6350864c56788dc713870f6e6cc1c63519eebececa802c87d8a1e61a42e861690d5d6918f9e3b5333216a66020522367896f84a19c3c3a62319676ab
-
Filesize
1.2MB
MD563b5a64c83850dcc98f35f66c7b02e76
SHA188d5ecafc99922e56894fa7ce0d3bfb7d77b9776
SHA2560b6c58b19a86aba68b9c3604fa0284da65f635064f3aca9eb1853933f2064c05
SHA512c6076fc2cc63e8ee469b7843516284b17d3a54340c7aa1b6366d560ebc516c90544afd6dca942b3542932c02150af08e4536a7d35e371d0785c4535d537b3a92
-
Filesize
1.2MB
MD5994ed9f2e9134dd01cd7e0fd09e8d0c8
SHA1db50caf9eaace7bd4d6c2b64054ce5e9c6eafb7e
SHA256e938b9f9c39a1026e85f049717832dc0359450d88a235d4cae20f7b8740b02f4
SHA512d0691709436620186e0c540e57eccc796a43885f6f51b30e35c3d5175d5308484f2803b959d0eccf1906943459efe5ae9846b3292e62007570b98524f3cea227
-
Filesize
1.2MB
MD50fb70eaa1b8ea2ba90f1f77de0be4fd4
SHA1a31e6a09070954fb56c66f50a0fee5956108755c
SHA2561ca8a46d11ba4e6426715d00b6e5b48b7bfcd96f1c4318da452efb8e82643152
SHA5128cac126d5e24a45bc44b5598905a7b38e2e31a4a1ad7e18f7d2611086a35f25ad73c56f2e0a4d71eb9f1877ba7b57ca9cc4c123a9efa546fc21123ebb7787e29
-
Filesize
1.2MB
MD51a261e48c23a0346585ee841e1c48faa
SHA102e66a529393bf28fffd33a34c64fe9c8ca01e10
SHA25669cad7f9a0516fa916ce2a8da08f8c3c68f6bf13cb4fcf743cb18ae9144bc1d4
SHA512db46d47f77b311ad07a8d2d82483c143c90fe48ffe1f77f3e906d5db2cedc10759b6946a4a6c9ec336c7e726622964f8719a4afb73446ad86a851e1c9ed6b8a0
-
Filesize
1.2MB
MD5388dec783007861a424b9346f45227fa
SHA105976d7d14cedbb3a98fb94d8be2b93f467bda11
SHA256d23b22c5260ca4309990247fe581311d9df7222d0309382321b6e47f00c43709
SHA512dd4ba066b1fa292117f92cad4b489b9cb0e07769a41abd35a82a20e949907878182c951a0f9cef88b514b22f0ade6df3972232acd598803cc8b892ad6a031aba
-
Filesize
1.2MB
MD53fe34586fdb1659b63c7f4dad670719f
SHA1ae187710c628d164cd472afa3cdfac85e98aa416
SHA256822d18bf2ce54409b833e683e898b3f1c0fd4d8cf76317f5586dd622e198f686
SHA5122f687e9921cf6a9f849fd05e2213bc8bd3d84822227563661a4b46a75ea222adf11603b8a7fd5c53f3f900fd1b236f3c302d248fff5d3d7028bb01795a45d119
-
Filesize
1.2MB
MD52fc05b54568890a57134bfb43e154d2e
SHA1ca2c1fde7c1879c6c21916b0c0b235be2ec02d94
SHA256d18a3f9b30910d1923bc4d6d7b3ba74e613d6db9b919dc61ff42a62dce76446a
SHA512d38d688636e2526a0bfce0b8e88f3d22a169cc0ded392b5e0eb52b84033ee78135b918e31e3e6ee2bdf83bffacabca53a26816da77e65eb33939ccfed558b75c
-
Filesize
1.2MB
MD544d911798fb5290634ea69a3781112ef
SHA1961f762ce03bfe09fd361c8b3f2a6d6ba7e66b57
SHA2566b467a755a6fa14f19781e9922b51e2f30e90ee4aa4f23d1d82aa8f54baf48a4
SHA5126def138fee2e78eb00a74c4751a1ae99101f88ecc0454809def941104a06cb2639754704695ff2367086fa986708ee635edb612103b4aca5d711abcf1a56004c
-
Filesize
1.2MB
MD5d3ffd3558ffc69c9d8abc1c73929a27e
SHA1a4de1fb3a506855b0cf71a85fa091aad4fc23324
SHA256ca79f56d3f975fcb0f919fa33f60bf1940180ff8a8da83b77d6da2a75bfbacfa
SHA5127018a8d134a0b858b03ef5e116d5db2ad107afb07763f23c042f0f1e4182c9bad3a9568b2b9dbf6e24f32238da6724694d1e54a0106bcb2d5ecc0247f71c0ba9
-
Filesize
1.2MB
MD57546e0dc24f30e58aeb19a8ea1cebca8
SHA186013abc1781537083894706e6d022d1e5890fe8
SHA256a76483fda1b67ee82546275997eca71cfa141d012c27c33b748f9d770d3a9771
SHA5129647a28126ff9c7d2efd9eb286376319b7431c17aa604de4c60d177659b4c2a35e169df89ac64fe9fdb2619badb6f349b3a691c9a4c75c03f907af91520a0ff0
-
Filesize
1.2MB
MD51f685ade72a7afa80ece7e4c08282d5b
SHA16d5c4b78230a421f092c8f1ccdec45f49ac8ed56
SHA2568e3accb143cc1afb256997ad551868df4747b34982eeaed553c937fb49b2dc8a
SHA512cbce7df913ea990a884f66c36c60b4f46c0c0136217462ab9f1f821845c45023679e47a14e8eb81b20abf1973652dadb6a457baf11321acd441e9715b99069ad
-
Filesize
1.2MB
MD5d33f64a36fbb473713898c9b6803deb5
SHA198ae2c3d99a1878d06faf54320dbe78984d95ee9
SHA25600b38a5a933abc3db447a29b9ae44aca1ebe78f1c15823192ffc23c87dc7e74a
SHA5129a9bf0cfa210d5e37e3a9f1102685fddbb8c4efe300feb89f148e2a91852592e2e4fa53d68ac9ff664de41fbab17c0c2d62a0bf922d3e9bc26779dc8f4e963b1
-
Filesize
1.2MB
MD53adc36f3084e4ebcddaf4db1ab537ff8
SHA19d24bcb7de3c9820c390d85a8e34f39caa0eb3ed
SHA256aa358bb3179a102a350d997032e34541ea209ba6bf1f339c49117c7a8d7e91cf
SHA5120b046951761d98beb33fa9fe862075f35cc341b8072e6ec971e6230212d420d444e7cbbd731a886e96b980161527facd5683c11c08e988e4b5e59cd977914b6f
-
Filesize
1.3MB
MD56b762ffed5c987a4c259192cf5a11104
SHA16831842179b20ddc39c544d13634fbc96f77fb01
SHA25610687f2d36b377e2fa86c4af52582d9a9a61bd5410c4f180a592cb6dc9f12dc4
SHA512f9e0f56613c5007aab01c5e6a6354a85e3c494f7ae51d980783a9ce806bc7048229842bde1d96120edd6272f6196ac5df13ad705197b8ae32657d63eb78052b0
-
Filesize
1.3MB
MD5cb985781d949d89cc79e90c3070682e0
SHA16ed0be86a905055f9d8140748e037c00f67e2161
SHA2568ae92a024b996739a2ac791719f622d6b898c996a842776379489bc84b12feb8
SHA5121e0962f72687645dc3b106908ed9d4d645753e3403c0553a55ebc68b0f32d75f641d86d0fad58bd5ca62c39fc789958fdc81472182899e022de0a0c4772f879c
-
Filesize
1.2MB
MD525e410e22b16c4d97b221ea628a117b7
SHA1089ecebea988d32b8ce0efe854366cd278b25d5c
SHA256115b3099404eea2723b231fc21461d54928b74799e60717d70e556ce658d6ae6
SHA512c4146151360cdd1ec7a76be51acc795dce0f9b495fa763778da4a95e7736a08ef8ded2f144ede788f59a23a1499f2a8462d0148cdeb3634e23b2e7bb425dca16
-
Filesize
1.3MB
MD529498cdbf1916c62cf9067e57b08130e
SHA140ab8b31c0ae324daae13ac16888e267b8699639
SHA256d40d0b898381c3ef0620b8661b03137e1779948e95f1a521b2c10037d0978e08
SHA512ea4c3c549659a5923e64a8f14b4a7d23e98e2d4b765d77610a614f03325599cb95be95bfc1d75aa3226aa4fa043c21d2aac7495bd943edf57fac9f12921896fb
-
Filesize
1.3MB
MD5f19ad1408892e3a0d4675efa87b22a3f
SHA1e4c5aeb064b9081fc457c8cee155cee8bd815c74
SHA2565c493a07e3155c7843dfc6cd715eee9266fcc57c89bc107b3201326036c7a2ef
SHA512bb11b91af7fb3b7c658562383c51a73be416a2d76f01f05eadbb0ce4fa466b2e9b4150ef0117964bb7d825afda31a6763944d6bad21572cda7b202ec17a2411d
-
Filesize
1.3MB
MD57dd441bdc464959faf08077fb9dd7cdc
SHA11fae21ed62e868d2ded9ce5b63dde8880fc3897a
SHA256da2d2b121b34bf58ca330aa38a1f7bc8d6966027258632bc5e0266963cb8487f
SHA51277edba62e96f89b66199e5bacfee481e221c25dc88054ccfd073ed7ac5a6c8046b5c00e1fe6f23a07a7acfa8cd2d884666d9f48e97c9abc3db468e39486ade37
-
Filesize
1.2MB
MD598ce2ba8b8efaa5518624e63c7d9db78
SHA19d801776976b27e0471873c174e99e9026f1478c
SHA25676f6e1dc60d3dd8cc7fc9b1e79baad053d1fb6cc2d7ab97426521ef3017b32f9
SHA512d7c2ef6ccde29a0de377cfac6013049d68018c50894f1d6270d08a3557548b27f161fd207477265c743a12ff750a23c8546f8b46b6ee0de11a471596d9298f02
-
Filesize
5.6MB
MD582ef8787f9054d26d7e9b8b20d2b9bd9
SHA1b292d5a0c148546f75a68f8872bf9e78cef0bad0
SHA256f3de4b8197379187012e751a42fc10d497be1131925299842effee097414379f
SHA5127a6b7eb9c0ecbb50914cd8b1adf0e5c7fea1efecf3cb34ba15dcdb6990bc67400cbedca382236e1ff2cab8cec512b7ff568bd90927064800358eb26786079424