Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe
Resource
win7-20240903-en
General
-
Target
2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe
-
Size
5.0MB
-
MD5
8e1cbc49b8359c8e81d3f2795a0cfdb8
-
SHA1
e198e8e2d8ac3d931bf4628823754a6006e295a5
-
SHA256
4a682dcd74a34ddf32d29c9ccdaaa3176cb23f1cfe84f248fc13b300d7bc8625
-
SHA512
17ff04358bd060e087573d445cefd3146323a3e9bfcf14219ecde6a8738d85c62b01c1d88cb73993ca35114ea684538ea94770833c3d0fef123ccd1cee3ae205
-
SSDEEP
98304:IDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2HpD527BWG:IDqPe1Cxcxk3ZAEUadzR8yc4HpVQBWG
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3211) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 10 IoCs
pid Process 5840 alg.exe 2036 DiagnosticsHub.StandardCollector.Service.exe 2900 fxssvc.exe 5224 elevation_service.exe 556 elevation_service.exe 4568 maintenanceservice.exe 2964 msdtc.exe 1868 OSE.EXE 4800 tasksche.exe 1528 PerceptionSimulationService.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\40b797cd40c5c813.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\system32\fxssvc.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\alg.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\system32\AppVClient.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\System32\msdtc.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_87031\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevated_tracing_service.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevated_tracing_service.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\nmhproxy.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File created C:\WINDOWS\tasksche.exe 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2036 DiagnosticsHub.StandardCollector.Service.exe 2036 DiagnosticsHub.StandardCollector.Service.exe 2036 DiagnosticsHub.StandardCollector.Service.exe 2036 DiagnosticsHub.StandardCollector.Service.exe 2036 DiagnosticsHub.StandardCollector.Service.exe 2036 DiagnosticsHub.StandardCollector.Service.exe 2036 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1844 2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe Token: SeAuditPrivilege 2900 fxssvc.exe Token: SeDebugPrivilege 5840 alg.exe Token: SeDebugPrivilege 5840 alg.exe Token: SeDebugPrivilege 5840 alg.exe Token: SeDebugPrivilege 2036 DiagnosticsHub.StandardCollector.Service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4800
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5840
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1056
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5224
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵
- Executes dropped EXE
PID:556
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2025-03-26_8e1cbc49b8359c8e81d3f2795a0cfdb8_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4964
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4568
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2964
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1868
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD55831c2697c5987b566d8e563323838b0
SHA1d98358dd6dbdb6e566743f07ada0af503f2ea30a
SHA2563830643ca1ff6404d9ce9bc25d8338075fc0ccbadd5ba8aea0aacf09f2fac06b
SHA512d8df76a01151ca186a3c5455731489a0005bf5c789bcd62953fb09b57be849ff71d9619d293d0b45ce973cf736644c6d1ed28a4ee77152769b9dc4a29fd82eae
-
Filesize
1.4MB
MD58105f60fb2163b0f2551771dbbc63199
SHA12a2bd44b3a0810ed7aadf4b1bbc387f1b224b2ef
SHA256e799017db035a6ffb747dc1b22821a8ab31ab65be79530e0bf8cc6d4595d1fd1
SHA51222bab5dc09c570a29456e6022e5bf68833b3e977b9872ecfd4f17eff9bca60354c9b3a29f492966a18e157d80623deeadae8e3a7bc13160dd4e113d67206f9ae
-
Filesize
1.7MB
MD53ac5b485efe72089474bc4be08eea835
SHA1df03d0ce95acc64006b28de4019bd60bec06830b
SHA2563b9be22c986607e0100f31db7ff43c32e2b0da70c4043028fbd89a46fa04d714
SHA512314afaa9597b2bf9ceedeb3b8469b8f2f07f45c7672c9b829c616188bf521ddc259dc87644fc808e90c02e0b877cd05f8443b887a6b84c6c5eef665ad244768c
-
Filesize
1.5MB
MD5a1f58e730cfc991661b533f67afd5473
SHA18b82ad577f543c1d2565991cbce5761b742e08b7
SHA256072a5fa9aa36ce3e7127d75ca70d9711a6b4d342fde9677c31f0cc4fdcf44ac3
SHA5124c29bb14f7ba4dcd9a72355724e8ccbd654c420ba29c176557346a9474787e44a729be04ea07fe43a6dd279d36d55bd07cdd9408c3af056e610dd44de3708ec4
-
Filesize
1.2MB
MD5f2f5e96aabfa2c39763f09aae116b09a
SHA1bc691eb0d250ced26f69a54daaeacecb00808d54
SHA2566ee65a280e16a6eabc6d1fc1ccc0e0e1c9d12dfd5e6055e53df4ec11733030bf
SHA512c5e3d8c589ec7e94308c5832518cdd1f68f8d0034a8e954468184a54ed58e37421649a96ea59cd1d82e188fe569106762990053ec99ea2408a6195f515f38364
-
Filesize
1.2MB
MD57d77f44f93cb9520bf7c4ce7bb77c711
SHA1ff1d17187d80856318c043fd8e7f3161c8032957
SHA256d34a2c48ffc852542c1ddf971804157900729c339e54ecb1ae9505a73beaaa48
SHA5124125acdac7491a121da21f3883b9082bf299f231ddae7c39f37898f9ca9de7d6bd7cec4c7550b03799b64cb950327e3e813288b9d4eaef67e1c0cf2e8cca363e
-
Filesize
1.4MB
MD545bc79ff807716e3f13acce434a4a050
SHA124762335889f9223e2860b58825d1d6e9fe1b4ee
SHA2569f7e47667cbcad60c5b5db129a99ebafb2b8be70d1c3f7e101c170c35442f34c
SHA512bfefbf324ad12f5d4130ab120269f125d7d4107c971aecafea171bf9ed295fe52234ae2b46e8d776513435c86a65c4aefd558470c2e5af95c93c08b9abed2287
-
Filesize
4.6MB
MD59404926db2c7a46d24c96ff70044a6e1
SHA14bbf0508f9741737dc940ec5336334caa3bf838c
SHA2568b2061660844f8d4c9793fbc46e8a804e8ac445a5672a357353fa976868e63a3
SHA51207c39015c6de0d630249158144635b0c711bba572f118e435c9608a90b535c2eec1f5caa5a9f3738ccb2e2cb6cafd2a04f7ed70d847975805af2ee1ef4a0cbb2
-
Filesize
1.5MB
MD597ef28a355172d62298256167f7720ef
SHA169c50dbf5f0b20cdf5549a080ef2d6fcb1c0a4a9
SHA256b9937dc895627f6b034ce47d6cd7ce00418392d7a46be98c447412530018f72c
SHA5123eb7f0e5aae7bbb44a48a262db4c560e5c9585658b5eaea34b17e36edca212899a8c8a10a04e3d19c6f8623ff0af4836abb9f664e08ea44fca3f7ef774823337
-
Filesize
24.0MB
MD53e5e279f8bce22523517692317811d92
SHA164e6876f74ee8b33f05fddab3a13bc1b3366f6cb
SHA256d10cbcc8ef55cbe243bddecc555de64c2da53e3394eba68a3f57c1477fd3f3d7
SHA5126d8dd200ece43148a73a163c8b3c846426137eb7f76d303c0d6c7cd549a0ccb87702716d762cd9cd6c23cf1e20bb8f8fa5456f86cb6a2d8a35eb142cc7acb442
-
Filesize
2.7MB
MD53bddd57ef25330c00e56957564659da6
SHA19111f2fc4158aae24579185d852a11aa5a310b75
SHA2560180cb70cbc7ab3796b2f23433402ce88dadabe4ed5ca8545be83a002d7d2b02
SHA512ef8a11bea23045f4a0223641fd8cdbc90875d8fc08724136182addd48054f1c8ece2f5cd2a3d2e9cfa540b8374b88c4c2990b3d25d2df082cd1fe73a67896deb
-
Filesize
1.1MB
MD57aa67498e533ec5e80fc8f11bea087dc
SHA110731fda3440d2f7c8c116d232ef9881f828e16e
SHA256f27134b9c7d8c81a223db53dad00b02ed6244192a3e027fc5ae0fba745472e16
SHA51224f260cb08cd6323f1f23e38d38278e476b8d6fa32f4ae1a9bbe3d14b199a1f07aa0f56c47e175f434af16af2015a775b84ce843a793cc39a6164489c2807845
-
Filesize
1.4MB
MD5ef4d7eda4884f8f325956266751ea922
SHA12f2af4e56308c3fdafa150fd7f23264e3879ef3e
SHA256db96ea7e22555745be0ddb71b2b925d3d69a5f4aac991bf53861f0eebf933f96
SHA512301db3940dc0aa9597704f2b3eac8ddcc281e44d2a3d275baea8ac57f1fb38583eeaee59df3a5698c4ab84ab413708d0cfabfb91a9dced40eaa92cb728ecbce5
-
Filesize
1.3MB
MD5706365a911e264854291d6844db8264b
SHA15b83ad5ad2130568fb01cae098fd3a0e88a42ecc
SHA2569fc37375e4f300f22fb066c563c8a9f8b9e345c8b5d8de252f1110b0cdd76be2
SHA512e0d71033a2642e0bf920b65764c1f6043f647a81a90ca99e361ca9c34cc3c11a04d922e2f5977dbbb43aefcdfa4a04011543a1044d8b94567b2ee11534b2f8db
-
Filesize
6.6MB
MD5598a7d7e028673e73a3666a0aab14168
SHA1a530d5ee1ae4b5e03980708e57c9375b43de4e5c
SHA2566096db46d7c89c76aff60cb084ba0e545ac4d06f0e69427285885c7ca1a96393
SHA512238202993ce1a61284c1f6921ebcc6467a05f46d4a1c8603a28b3d859c9f07aa3ab06b10052bc7715dc9eb7c07b9416bca7d1e93fb376e08fb6a6dbe1227cd11
-
Filesize
6.6MB
MD55626020971ebcc2d6352cb3bdbf39735
SHA15297a7ec7fb063837b11290df05a4505e2b04290
SHA256381e4e39973d5c567f629b0d53f3286abff3543c0184d5d794d78103054eb0cd
SHA5128f064fa5968bfa2ce9760a12dacb0f0ccf133b48ab0a23783108b1778347bf518bed27e195ce1c4f041e91aec94a46f439b358738d27184b7505b4cd6d01f8b4
-
Filesize
1.9MB
MD5f27ff4c9792d321a28a6f90dceb5c255
SHA1775649258abe12ae8b6eef558980f90276c209be
SHA256d317363f3ea073afc1572dfe7731eeb328948d1e5650a1197fd401ea18417906
SHA5123bf3bada0239a6113169c24f076b5f4b8d49ff9735db08467444240d830a051e97f861e96facf0fb7da2af730fb65d728e43103710a676651297acfeb2a56773
-
Filesize
3.3MB
MD575a4eca4c5dd32e2ebed828dd3303702
SHA1f66c3ef149c396f666d1491c543f72741cd39613
SHA25683d8a5a4eed52c336cd587306aac8a8c3ffd00862f41ba2f10cdc64feebd55bd
SHA5125fe5635f809c28a8b967a6ea23d32d47134011905de84daef13010f52644567eb236ae81be6d7d8bae4ac0dc994dcc90aa08ecc6a4f657b5adcc67753d96bc68
-
Filesize
2.3MB
MD5fc61b811467139b70bd0fde23c1f5aad
SHA11e089b93672d4615d634ffb617ed53a9651e68af
SHA256f09b2770df6459f004b675aee72e080d0f09d7035b412e6b17a8faad83cc4926
SHA512965093888562e0db3162f683433fbb3c79482c53a7778b058b3eeebe924d542cd1c5b082abd884cff31168966329a0ca632455baf3dfc68701dd05158f6506f6
-
Filesize
1.9MB
MD59419ea93a4108fcc5e617767f09bd0b0
SHA1178c345340a94641aff609cb6feb1d2dc5dfee8b
SHA25670c449745bf1fa44b12cec77792faa3f5c3b9b314c24bd0077ecda06d9a6a42a
SHA5120a98474d4f9faa547ef4f9f502c086689004dcac52683c5c8bd636ade4c29a2a5a85da86c20ef5205314f15772c302bfb73ad6ea0e90370e6db9da67a8d75be1
-
Filesize
2.1MB
MD553a9f733cae9584e4427b81fc708d123
SHA1b679f6f85746d1b7e545e3366e3b9f17ed0559df
SHA25663cdc496773ff191e41cbcbe6346a3582c3548b57ed2d20e06f7c1752ff52057
SHA512bcc361c4b6015b278e5fbd0bf54352fa817ac694d0471ef8a75a7edd792303c855eebfc72c7b7cacd48e994905cf863d7571a2dec8e3a8cdd62f898d0bc9c0bd
-
Filesize
1.6MB
MD55666ddb2d1a540513238858c2b095121
SHA147b929a393c610b9f2d0be438bb124cab5f5b39e
SHA256d675dcf5a4ccff0b8ca53b41181a993e5fd4d277910507b2ffb60bc1e4499167
SHA512e0365136c00aa59d8d75deabd627e0d4ac0a6809bd4530ecd2711b44fc7a4cbd9acb7095cd62bf9de6e9b3a868c6ff14a9d64f086ea69c995d3167fcb25d40a0
-
Filesize
1.2MB
MD5ac7c39805b2247e41f7088fdfb6b050c
SHA1c73d638032eac08b0de958d3df5ba7152c60dca9
SHA256551dca525c75d5744eb6a200df87bb1246c71128553157c517bc035c537e8489
SHA51253cb86d23683dcbe087b7d61fb979d5bc5715e04c46ad53fda3577e67b61cc37ffd670cd13e747a26cb2a4fa0a10146d98e511296e10a5b003b8d3faa514b72a
-
Filesize
1.2MB
MD5508168efca5995829a2a7b237a867856
SHA107099c33d5d2e86c926c59a6f8915dae93eeefac
SHA256bd557fd4c822f84f22221b8cd9fdc95544871cb5d71adc3aed9770bf012a7b95
SHA512fd77134eecb889f4a27ada0967222c343747acb5665cea14939134bb027e373d5ed716afd9a0e02589c9ca0c6cedd6ad4be2db0327a2554af5ba6de584f1d109
-
Filesize
1.2MB
MD5ba3da60472226768d513a788eda4e259
SHA12d60c21b0928e87b2c7c8478ea244055a0ff68c2
SHA25670ed4d3a84cf4462ab33ec7c5a00db4fab78f406536aa57ef347489ae3966a58
SHA51215e54490d8297bb7bb316ebe933739632c273a6a57612dcdc2089e3fee5d04822e939ca6086bfbe20d16a14dc72bcfc39a51d6a979494c1d240ac20859374765
-
Filesize
1.2MB
MD5f870dc8299817017cd682a8de323dfc2
SHA13ad213f47bc90758230f455f1314fcc55b715ca3
SHA2569ca2d6832b9f7935ef12d62d701810ad19c3939c3af2946e920073e9e7175a6f
SHA51287c48ef0a8440174da7a7d5af48bafd9bb11aae6d89994a5bdc5f44ce19ac58b1456ad45db4f0ec928b1728600444e5628db3d5f54f7ad79bb159ec05fac9c14
-
Filesize
1.2MB
MD5e1d7e1782856a966f103ede83e8f0217
SHA1b38b1932760803d3ea913327bd3fc2dafaa1cdce
SHA2564efb097093a94a8ff1a16a51e72b860d821224d20bc16539f1499da81fcc6b73
SHA5125010530cb930e9d52f24d315cdc1a3a77e28e3ac695f8cd12b812c10122c652b0abfc0076c218812342aa2877252e549cfb323323b7ccba491cb2b3c1137ae60
-
Filesize
1.2MB
MD5b45c996118b2c46495f92f6aaa813313
SHA17d78727fe11f2f6c69197745adad6ea4cfdd7e84
SHA2561db49fd7de77ea71a30fa6c15dc8ef14e82c66220917efe8e9d1f11c159d50be
SHA5121ee4533f9ac943b04f3aec3eec433a77ce3fa49afa4396975bb5736c819b4d728423e29e965715b5d76a45db8bdd7a60f1cdcfbc526deaec38cfb81be4e35bb2
-
Filesize
1.2MB
MD5167ff7ad2ad0a740430f1aaede835d30
SHA19c0dab5073ff170ee74196f035add40ccd5c229e
SHA256c56f2d8b19677b86f979b4549fc758c4ec44a3e89259b3bf10f4a3cf952c231d
SHA51285df65f2811be4660b292a50dcc400369beb249128c9fc3d138f62cb3f6c80664805a8b7e552be6b644394aac33d5e8ed387afb75b2f26dbe240e4c6c22c94c6
-
Filesize
1.4MB
MD54a134392dd5438ad08c35febfe3c3f4e
SHA17b07946276afe99184fb40e624fbbb245222e73e
SHA256b9add275f6674879d2aeec4708e3174ab74a7fdffdc383a6c596be02b6f8adb7
SHA51209e530b3eed48de4bca985c73fd5b0fa2ae856b96dfae908e7df137ef8469fe90de5a0f35a32d7c4f409385f0abf10444e6a44c18b07be1ea4ca5dc21f5ba488
-
Filesize
1.2MB
MD5c81fe0fc7c5ed81a2cebabbabc0d7a18
SHA1e39b99f76a126bf8404cf7e1a096f164625ed1b3
SHA256c68a907ca05b09cb7c2cd45a504b1a885f718af0de9b856837ccdb6a5ce7e8ce
SHA512949de5858ad695ae3b9c32463e5bfa6ae2215bb1984c28a74e2d8ce70542bb0113768d760f70caf137d11acf4fec1d5dd616085ced0ec0fbbf1e3f1e53e8ceb5
-
Filesize
1.2MB
MD509f16347d92ae2bad98a95c44c9d4139
SHA1361157ff3b2baa932643c5955a545fadb54decb2
SHA2567409be827f58d16945341e436c319708397a06e1561ff404e7d4ac289d13d838
SHA5120ea6fcd0fcbed2a90abe974f93747377ea85f9a1534b1f6e4743296d2b4292e9111dab661718e6dea152d78a796e4a48dce57e56125e16cf2b78de58c2ebee14
-
Filesize
1.3MB
MD512d4d231c194798a9265e63ad0538c73
SHA11e2ada890cbe8b8ff26ef8b4b79622aae111a97b
SHA256c4cb7e22eb9dbfe84b41b3382a71ed7d5c53aafb45facc7c69e98f41f85432a9
SHA512c9df76e10b338977025b79238aeed7220c48c6811d9ee3323cd5b5781c2e2c6a92fa7fc6882ffbe6cb3416efd63b5f5980b896de790f0b3bc032fad205aecf80
-
Filesize
1.2MB
MD597b314674d519222eeca55a4ec6e3776
SHA1203c4966093be6d20b4345506f45726015cff81c
SHA256442fe44a94dc642b9ed8834a3efd8547a2b9b449da36154caaca9ff234e67936
SHA5125c3438d6eed4c532537cc3107726b9e3b93c2dc2bb089b6a9188c0155a9e3fa29f40b48d182288dcfd1c9fc62fae04e69c344727eed8d089f8b94155bb334c04
-
Filesize
1.2MB
MD52ff09418b272a19898af981378117655
SHA10bde99d035c2baa47e6213700f806a844f20a058
SHA2562972f98769964d17aaebdfb1488b3fbf25097265df547ca80b600bf5066ba5cf
SHA512bb079b541430a87479a5a78c625c7c71e5a3f0c0e0b7cc2918f71e5a3de90d98bb698389575b319871e42e26f7a5cb9bb5d1e911d0f44f7d4d5454bacd80e50b
-
Filesize
1.3MB
MD5acc31d159027cd69816acf979c42793a
SHA196a63486a813f251fbd360b6fed506918ca9305d
SHA256b6cd61dde0e62d41ac2326c96bd8533e4d399b490f332352add5e8b684b79ce5
SHA5125827243e16584e368c1aa4469f97f4374ab0271b459a2f8cceb46f5bf5b2ac0c1be47712f47303713401158d514ba912c8d906c74d274c1559803e429932549e
-
Filesize
1.4MB
MD55508b2403a91fc5e635146848fcf22ea
SHA1125f5b230832644c909d1b0e45c3cf636ab36d2a
SHA2560570c30c94063cc18e9a8cff92d3cca0f35e5d103e2b0d23666f1963a0b80fcc
SHA512f99869762e2e83400191c2abc1782508e21f8f42b33dc6a9ad36fd8c18fcdcc2ed3112877b483766bfac4bd5458de41170ac582180727bc09f7a208563845ce1
-
Filesize
1.6MB
MD5909f43300ddd3213c3a2923d0ee4a78a
SHA19d5292f88d51eed8c981e5f7e1dbd4b1d9d96260
SHA256570d77ee1ed82a77786efcc0a1c44b06d94363b2a5b12adb32ae529ac8dbd537
SHA5127a51a02a7c9737013e41e642a38512ab677028181879e53dc135da064a34d3a3f931dc307b13293b501fea8143c9d7fd4123034cb187efc4198201e8b9727aaf
-
Filesize
1.2MB
MD51b653be885fe3f023fbc21ed955d87c6
SHA18db4ec9365e13d8383d2ec522471f56d717071c1
SHA256681557a4d15c225953a4d7fa2f381f4d6645216f6b3042575565b7f5ebb26f08
SHA512ce40841a4e140ba9ab0aedee220e5a63a1c7e844141c566d4f01885aae66e188bb7a1250386e6f1b09bb3023fcb13402987aa3cbe65ef7e85eb7afc67082988f
-
Filesize
1.2MB
MD57e088fa49478e48fbaa4b270d1743728
SHA1d37a493f7bc5be681cf1ce0f67eb2f516b51f26c
SHA256fe411673c6fa1f590fbfa55750106567186ce65a27b2d781688cd793a72a082d
SHA512b9b1c40bf05dad6e2d2904ce7a8fd4ee111dd3a215dd6288f737ca53c482d08d4406d10026761d3c225f97469b803b9f80d00bc19d3342a40d20b86cc477d648
-
Filesize
1.2MB
MD5d58890cd4e1f4aa412006e2cda05bd37
SHA1ed4e147a07d0bd703c06ab2958743c17b144e420
SHA256823626137583fa0e3563c50ecbfe541c6079e215f1e11788bf71235aa88c6bd0
SHA512133456e29a29f2703e98aee6de9244355eabf0cb9b77279560dca7df40f0f2c88020e182e403997afd6297a794a3f3dc86f3a6887bfa86329eb939ee6fc3a60e
-
Filesize
1.2MB
MD5e724ade96b9ed06f4286b8df2aa2e82c
SHA114fc18b5c3bd6c55a7f3f4c86b083da4f01f26bf
SHA256348be321101cba59450a84395323163514f5c8ef10319996629dd85499a29eac
SHA512d895b18b153d031ca25ac26b5611f984e8fa84ac3ba70007a9861e51474e31e4461d0e82cc5b1ab1d35412d5e00c425b18da5c360d327364aa13db533e29a915
-
Filesize
1.2MB
MD5d077e3407dc92bb9b9cca2f9cbba081b
SHA1f703810a83b03585dac00fa41c881e67bdcfaa18
SHA256b0024b7df4e65d96ceb7382861abac95feb58503816e09e1e47bc6dc5ca8a4a1
SHA51224137b98c796cc28e83019cc118f540b1958774852572de24889dd8877f56f8ba1916c24d45dc3c610de88e931da38d8829e7b93151771e73cdc7c3ccf225bdf
-
Filesize
1.2MB
MD566507151dae19cd7ebdc225e0cfb10ba
SHA1179e7ef3b25b833c4cabb3fbbc22a7a0679c2190
SHA25694a5a12dbe24f3d6ed7d4ced92ad45e90d4baf1076f26e0c652bdde90ae1337f
SHA512af927befd0f7a23aa198ec9341395596fa54dfffeb69554c986066cad71e998b08428cb1510aecda143fa5c3112c80caa5ad9458395bd05a4c9bd8a6c3b317ad
-
Filesize
1.2MB
MD56113f356a96494a43ff9eab1910e5052
SHA10b5eeb7216bad9c0e241bdf03f324884b2bef57b
SHA256845765f2a9d225c1d0179d00554d8aa24525c6b5dbc42193086559ff65ac01f0
SHA5128c6a3371e83a190d96d05c118e29c689b70f70113b1b56309bb849cf84fc0711a97b899f2f4eb90d64bf4cdb4527b4aabe0080ebf232ab6fffe97023c74cd35e
-
Filesize
1.2MB
MD554394acc290debcb512d835a848d29ff
SHA1cf2b1a53b9f1c743a05b5095e2821aef7b920b9b
SHA256461c8746c713bf5b05156b5d2150104fcbf5da086c4720af9062387f2f334823
SHA512bf5a31a56b8f869f820562302a95889f21c691c4718f84488e160a1358f1e9bfe2e4b14ad31bff20a890a7ce77ff2e25acf70edf82132bfa2fde94527f92a87f
-
Filesize
1.2MB
MD556d82ad61f5e650c762575053eb1e476
SHA11a473672a67bb6f153ee04637b3858456a408e0e
SHA2567c13fd07d339237034c9264bcc53af6437ffce51cffb064d94fcb7d789cfcbf9
SHA5123bd1122a11173b85fa7aba223d79e385696bdb1de1b4f988bd7207ce71e49c55568cf2f562b05c32e281aeb25cc04e8eca762d864cbf018d633cac7c3cbbf3eb
-
Filesize
1.2MB
MD524dfe237c6138048616af620a677cc97
SHA153b1a6f2bff15ccadf3c215f09345d65d4599ee3
SHA256cfb4c7dc346ec356fbb573ef397b3ee818b3b2715613773882718336033a216a
SHA512e625a7bc06c9cf6b486117b5aa9e9c936ba7d1e6d9d592740a259e0e0dae841a1f45373930043911f3f5111eff7568be0fea242476ace3538b6071c1cd5ce5c8
-
Filesize
1.2MB
MD525ad12dc11b493ec186206133a5fbd17
SHA1fb348d79d51f05aa0eecb5444e28e4797c16caaf
SHA2563d1dacb60637ce2db41da6d7868a5e8114340ee6a99cc9680024e8b8940b4134
SHA5124c940dabe7b53a47cea77e1a59365f586f0f32343870f1b51197355ceb6f9cc3cfdb8970ab317962a0754dda11ef775d9bfbd84115d4334f5732582d6ac9f0ea
-
Filesize
1.2MB
MD5efa7c5b316af7905f9cb737b4b627595
SHA15ff6e355de2a20be36e63e7981bea7ad7d86ec25
SHA25699048f17dcc69119a407d783055a78594f5c8e4ea3cacd9f8e6a2083025c40bf
SHA5122b56cb221f4d99d22d1efc5ff6dd38f4be57d3adaac1e397a5d7990ef86fe1e2fe2ef31cb6deeb9e8fc3bdcbdc93e5475b3488c4c0fb5c815c79e7176d2d803a
-
Filesize
1.2MB
MD51a8c749639d66253438a49c31788017f
SHA14e1bc4dee1a37e23338085939fc89d6e8112404c
SHA2565dd2f9a0547dc4cdccd7ec046ea3ad11cd63203e8b2521784c2377ddeee646e2
SHA5122d8dbbc11b0121059eba40ea6933f803fd6ebc89fde52e0e3616b4778988993042df77e5fa1893f23ceafe01d012f886185be397da0dbb2a035893267684f20d
-
Filesize
1.2MB
MD517a08249dd7898632e6650a9a76db603
SHA1db4fb81c2b65970573d81fa5998842828f24b484
SHA256eea57c5a09c103a88f337764c1fa7c3b043943b4b8b1c1a45cf724af21913648
SHA512a25d7e9fe58237f324afbca83586875bc7c1089dbf19059a8c13ce10524007d9760ec3064121867bc93f6544fa0fb6363d4482dd0f404d739948e3e6abbbf40d
-
Filesize
1.2MB
MD5c01baa06a3b29696c8a4dd0ec7c1960e
SHA1940685f480a588c552f663fe94a2b2c195c60509
SHA256e2bf2f091234112de1c7726bf4e6d639f72ccdbf76f263afc6204f3a1b02929f
SHA512729c537d3d943a3ca59807661fc3a8223208d3c1775fc009067e87e8f8d3bb3b47fbca8d27cb468b6b92c1205b4cbe7bc67aef2999891a409ba6b5e07fd96ffc
-
Filesize
1.3MB
MD56af7ef17ae56db9ee42ca8a783164bbd
SHA1178601118ba6b5e99967526b95d970bf596ceff9
SHA256e9b028a24810bb31eb0b46ba361ecfedb6afb4631396ec6aabc1808a20afe0ad
SHA51228224cab62030bcc1495d44ce1974931fcd5b6692edb25ba1f9fc31e6916a7c1ed3aed4dcc1e211923d27171f587e72f9c907a6c0845399dc27afed2b6792d91
-
Filesize
1.3MB
MD563a0c921b9a6fd17dfbf9b2ccad302ed
SHA1d1aa216c7458de68bdee9df407a15e994a711f30
SHA256820a35a33e6b36c63ef200e25bd6b2c7ab8dd21270dfdeb291a91314d2661874
SHA512819b6e10bb2a6e94937c1d9740b6f1abf027be917777c4db1c16b71fd4c54829e875aabeb4d643916cb7f4482b0b102e34d6fd055d2ba3b95331fe4df585b6d4
-
Filesize
1.2MB
MD57a8b55d3910265fdd0cb00332d094680
SHA10b3c32cc65b4b453ae0e51078914d8ab47afb020
SHA256b6999239839e2be1b0893778e648dc8e205bc5884c2c8d1188856a5827568061
SHA512b7d9411fadf792dcb43357787e90e1d0b3d75f4de1afa247233320ce91d7a0b468096cc55f4389eb2ca41560801323a671ecd792cd9ef27010c85658ecb28ab8
-
Filesize
1.3MB
MD52a745b2c4f8a140501f54bdf645d9f18
SHA181a6e7983b52a4c972bda92eb330a84d82ce2b10
SHA25674c6e6be9a55ae037a8228a8d84abe9235648cebb5ed19482cf06f04d2f4674e
SHA512f554d4fc2108d683e350a30a248960cf1eaf6e5fd9d54c5e970aaf5b2c3f2b9ef79d7708f31216195de0c36a2a6f0bbc5116c2789136713c1d7e22f851898f97
-
Filesize
1.3MB
MD5b0d634bd8e90333f6573cbc6d34e48a4
SHA14edd4ab25f441fe0621c665a649a2885f6f33fbf
SHA25662d3921d6578fcfdbbd617f34529d33b5410b31afe5cfe609eb9e42cf76216b9
SHA51292097b1dec1bb408b49a385b3213d741bd0d63f4eb4f33a06573e9d813271ff775d85d0c7624dba64e7f17612a9036aedb1faab9b6f5cb73da60eaaf80640dba
-
Filesize
1.3MB
MD5ea17d346c0bbc45bf6c126830f7104f2
SHA193264ec4aa6f41bab0d693dc0c30d4afb55b501c
SHA256a3e5881af1714f4217567353a38dd5bb26fa14278410d202d9a76651076f7d7c
SHA51276b7b21345f42dc20ff8edfbef27108741734bfc17cbff77c4a7c5e29a10a35fbf8d9f14e8644a7b611dbb33baba6e404f942e01d448462cfd8833e844fc2514
-
Filesize
1.3MB
MD55b87e22c19363bdd56975ced0cbb2618
SHA1341f3c69bb6228726caeb4b4d52ae2e2dff02c73
SHA256c728c5fc838d47f48f345cb34a8597eb15eb1c04c94a6dc2a2faef6b3492d747
SHA512c504ceb6ea2f841ed94cc363fe6e7efc9904d96f0c67c012442f1fa955ef9ca22599882433b50cf5eb308a8d1b35b1c16cb5388edf1fc05996e13a75fe7066ec
-
Filesize
1.2MB
MD5d23f10136a29986899d6482e3640c304
SHA1ee240e5764bcc2ebfa70104c37a24f9636fcd23f
SHA2564992befcbdc03c236fc79737599a8ab695ca1f93aa455ffc22a4f97029c03d0f
SHA5121b90a77c32f7559a0dd6f913fb5951053e0f49fcf7e3c9e4e10385766ba428243f43083a8975a85316d0437e4d5c7bcb5c6e45182f97466098508a720cf56c47
-
Filesize
3.4MB
MD57f7ccaa16fb15eb1c7399d422f8363e8
SHA1bd44d0ab543bf814d93b719c24e90d8dd7111234
SHA2562584e1521065e45ec3c17767c065429038fc6291c091097ea8b22c8a502c41dd
SHA51283e334b80de08903cfa9891a3fa349c1ece7e19f8e62b74a017512fa9a7989a0fd31929bf1fc13847bee04f2da3dacf6bc3f5ee58f0e4b9d495f4b9af12ed2b7