Pages:
Author

Topic: BitCrack - A tool for brute-forcing private keys - page 80. (Read 76881 times)

hero member
Activity: 583
Merit: 502
Is there a plan to modify the program to work on WIF instead of private key?

WIF is just another representation of the private key (In other words, they are the same thing)
member
Activity: 170
Merit: 58
Is there a plan to modify the program to work on WIF instead of private key?
newbie
Activity: 30
Merit: 0
Currently use the following :
blocks=300
threads=128
points=512

1050Ti
-b 90 -t 512 -p 512
86-88 MKeys

Rx488
-b 72 -t 256 -p 2048
172-176 Mkeys

Rx574 itx Pulse
-b 100 -t 128 -p 2000
132-134 Mkeys
member
Activity: 245
Merit: 17
why deleted -r  from last version?

https://github.com/brichard19/BitCrack/releases

this : Improve OpenCL performance


Yes there is a bug for opencl ... the fix is here: https://github.com/brichard19/BitCrack/issues/223
newbie
Activity: 1
Merit: 0
Hey Everyone ,

It's my first post here so just wanna say quick Hello.

I'm using the CUDA version of BitCrack with the following specs :

Intel Xeon CPU E3-1275 v5 @ 3.60GHZ
16gb ram
GeForce GTX 1050Ti
30'000 Target list

I'm getting around 60-61Mkey/s is anyone know better configuration for -b -t -p

Currently use the following :
blocks=300
threads=128
points=512
 
Thanks
member
Activity: 107
Merit: 10
if you want to lie *cough*use your data; not mine.
Hey Fellas,
If anyone can provide some assitance in regards to my nightmare lol... please let me know and send me a PM. Its not a hopeless senario but i am at a impasse hence why i am reaching out....
Besdies this,....


I feel as if im missing a % or somethng.... does this seem correct in terms of output?
which is better the CL or CU ....

Instance 1
>cubitcrack.exe -t 512 -p  1024
Compression: compressed
Starting at: 0000000000000000000000000000000000000000000000000000000000000001
Ending at:   FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE***********************
Counting by: 0000000000000000000000000000000000000000000000000000000000000001
Generating 16,777,216 starting points (640.0MB)
[Info] 100.0%
[Info] Done
GeForce GTX 1070 2956 / 8192MB | 1 target 227.58 MKey/s (6,393,411,141,632 total) [07:46:27]


Instance 2
clbitCrack.exe  -c -u  -b  128 -t 384 -p 1024  --continue sess.txt

 Compression: both
[2020-04-15.12:57:56] [Info] Starting at: **********************************43937452  (edited)
[2020-04-15.12:57:56] [Info] Ending at:   FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDC************************ (edited)
[2020-04-15.12:57:56] [Info] Counting by: 0000000000000000000000000000000000000000000000000000000000000001
[2020-04-15.12:57:56] [Info] Compiling OpenCL kernels...
[2020-04-15.12:57:57] [Info] Initializing GeForce GTX 1070 Ti
[2020-04-15.12:58:07] [Info] Generating 50,331,648 starting points (1920.0MB)
GeForce GTX 1070 4608 / 8192MB | 1 target 101.48 MKey/s (3,516,003,613,671,424 total) [07:04:35][2020-04-15.13:40:54] [Info] Checkpoint
GeForce GTX 1070 4608 / 8192MB | 1 target 98.35 MKey/s (3,516,009,049,489,408 total) [07:05:29]]

newbie
Activity: 25
Merit: 1
BitCrack does not authorize private messages from noobies like me, I allow myself to send him my request here ^^ which incidentally and always the same as before (I don't let anything go - lol)

Hello,

First of all I want to apologize for my English which is not necessarily at the top.

I had the opportunity to try your program and I want to congratulate you because it is really effective.
On the other hand I would have liked that this one seeks only the coordinate of x and not the bitcoin address in its base58 form.
I think that after all this must be faster (I can be wrong) because it is the first thing that this one calculates after having given him the private key. So instead of providing a list of addresses
(eg: 173g6UwTFYWKrks6h4waxNdCewsPWeLuUo), I would like to be able to provide him a list of coordinates x (ex: d41255c006185d9dd1ab6eccef02bf8a6b8cc7e20cffbe84b8e0b6) and that the program in the same principle as currently checks the correspondence. Unfortunately after consulting the source code I am unable to make the changes. If I understood correctly, the modification should take place in the function:

void KeyFinder :: setTargets (std :: string targetsFile)

where the addresses are converted to hash160 before being checked. this function would therefore not be necessary for my use as well as the others (base58 - sha256 etc ..) only the ECSDA function interests me in this case. My knowledge of C ++ is close to zero and I am unable to modify anything (it is not for lack of trying ^^). Ok, would you be kind enough to modify it or at least provide me with a piece of code or some details that could allow me to modify it?

I will understand if you do not have the time or the will and would be grateful for the work already done by sharing Bitcrack.

Your biggest fan ^^

this request having become public, any charitable soul is of course welcome. thank you in advance
newbie
Activity: 25
Merit: 1
first of all thank you for your answer, I knew all these utilities and I have already had the opportunity to test them. The problems that I encountered with Pollard kangoroo are that on the one hand it does not use the GPU and that I do not wish to search for the private keys with their prefixes (02 or 03) but only the coordinate of x which is elsewhere calculated in the first step before check if y is odd or even. The ideal would be a model like bitcrack which randomizes a private key in a range and submits it to the elliptical curve and checks only the coordinate of x. I think it must be possible right? thank you again for being interested in my problem.
full member
Activity: 706
Merit: 111
Hello, would it be possible for someone to modify the program so that instead of searching for the bitcoin address he searches for the public key (compressed) in its hexadecimal form without the prefix (02 or 03).

Example: we know that for private key N°1 (1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH) the compressed public address corresponds to: 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
I would like BitCrack to search for this public key without the prefix 02 at the start (basically it searches for the X coordinate only)

 My goal here is not to find the private key of an address but to search (try ^^) to find a correlation between private key and public key. I know that at the moment of today certain think that it is impossible (and they are certainly right) but I would like all the same to carry out certain research and that is why I will need to modify the program. Unfortunately my skills in C ++ and even in python for that matter leave something to be desired. Thank you in advance for the help you could give me or any external link not too complicated to implement. Thank you



Bitcrack is not made for that but you can use this for what you're talking about but the speed is not with an gpu though.


https://github.com/Telariust/pollard-kangaroo

https://bitcointalksearch.org/topic/m.52473992

https://bitcointalksearch.org/topic/m.52318676
newbie
Activity: 25
Merit: 1
Hello, would it be possible for someone to modify the program so that instead of searching for the bitcoin address he searches for the public key (compressed) in its hexadecimal form without the prefix (02 or 03).

Example: we know that for private key N°1 (1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH) the compressed public address corresponds to: 0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
I would like BitCrack to search for this public key without the prefix 02 at the start (basically it searches for the X coordinate only)

 My goal here is not to find the private key of an address but to search (try ^^) to find a correlation between private key and public key. I know that at the moment of today certain think that it is impossible (and they are certainly right) but I would like all the same to carry out certain research and that is why I will need to modify the program. Unfortunately my skills in C ++ and even in python for that matter leave something to be desired. Thank you in advance for the help you could give me or any external link not too complicated to implement. Thank you
full member
Activity: 486
Merit: 102
Hi, i have a problem, i have a wallet which i saved private keys but i can't find the last part. if don't know the last 17 characters of private keys can i use this software and which command i should use?
jr. member
Activity: 32
Merit: 11
Great ! new version

2080 - 188.16 MKey/s (old 155)

466,284 addresses loaded (8.9MB)
GeForce RTX 2080 4937 / 8192MB | 466284 targets 188.16 MKey/s (215,884,623,360,000 total) [15:23:48:58][2020-02-13.22:33:11] [Info] Checkpoint
newbie
Activity: 11
Merit: 0
why deleted -r  from last version?

https://github.com/brichard19/BitCrack/releases

this : Improve OpenCL performance
newbie
Activity: 11
Merit: 0
No one answers? !!!
Answer at least my question:
I've overclocked my graphics card
Has it affected my graphics card?
And the output?
newbie
Activity: 2
Merit: 0
OpenCL version is known to have such problems. Someone must fix the code. I only use CUDA version.

That's right.

the program skip private keys in amd rx580 but working fine with nvidia gtx 950m
anyone knows why?

amd rx580 command :
clbitcrack  -c -u -i test18.txt -o out.txt --device 1 --keyspace 2:FF
...
The clbitcrack has nothing to do with your AMD GPU. In order to utilize the GPU for this task you must use cuBitCrack.

He can only use the buggy clBitcrack with amd gpu.
jr. member
Activity: 59
Merit: 3
OpenCL version is known to have such problems. Someone must fix the code. I only use CUDA version.

That's right.

the program skip private keys in amd rx580 but working fine with nvidia gtx 950m
anyone knows why?

amd rx580 command :
clbitcrack  -c -u -i test18.txt -o out.txt --device 1 --keyspace 2:FF
...
The clbitcrack has nothing to do with your AMD GPU. In order to utilize the GPU for this task you must use cuBitCrack.
newbie
Activity: 2
Merit: 0
the program skip private keys in amd rx580 but working fine with nvidia gtx 950m
anyone knows why?

amd rx580 command :
clbitcrack  -c -u -i test18.txt -o out.txt --device 1 --keyspace 2:FF

test18.txt contain:
1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH 0x1
1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP  0x2
1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb 0x3
1JtK9CQw1syfWj1WtFMWomrYdV3W2tWBF9 0x4
17Vu7st1U1KwymUKU4jJheHHGRVNqrcfLD 0x5
1Cf2hs39Woi61YNkYGUAcohL2K2q4pawBq 0x6
19ZewH8Kk1PDbSNdJ97FP4EiCjTRaZMZQA 0x7
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e 0x8
1HSxWThjiwbC4dJbXHMpBfwRenB12UguG5 0x9
13DaZ9nfmJLfzU6oBnD2sdCiDmf3M5fmLx 0xa
15wPJhwthAkBtUgx3qFEyCtnK7piuu6Xvr 0xb
1M9sZKsStVRZyBZSSVe13XMGRtCHkNj7VD 0xc
18xiXDdYhapNJoAp4UAkJa1WZT9U9FmQiD 0xd
1BS2vyPFUSDKfJKw35MyAAUvSzXpcBLgSJ 0xe
1FZoTz4UBrfjpf7DdGGuLdPBqSMx65tKuy 0xf
19p7ktDbdJnmV4YLC7zQ37RsYczMZJmd6q 0x11
18FtYoEJipP5bCJnjgWdeeEbxSvozSjEUA 0x12
1Ny3b8r8HhkQtwUBePqKdU31qBV1xWS64Q 0x13

output:
1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP 0000000000000000000000000000000000000000000000000000000000000002 02C6047F9441ED7D6D3045406E95C07CD85C778E4B8CEF3CA7ABAC09B95C709EE5
1JtK9CQw1syfWj1WtFMWomrYdV3W2tWBF9 0000000000000000000000000000000000000000000000000000000000000004 02E493DBF1C10D80F3581E4904930B1404CC6C13900EE0758474FA94ABE8C4CD13
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e 0000000000000000000000000000000000000000000000000000000000000008 022F01E5E15CCA351DAFF3843FB70F3C2F0A1BDD05E5AF888A67784EF3E10A2A01
19p7ktDbdJnmV4YLC7zQ37RsYczMZJmd6q 0000000000000000000000000000000000000000000000000000000000000010 03E60FCE93B59E9EC53011AABC21C23E97B2A31369B87A5AE9C44EE89E2A6DEC0A

OpenCL version is known to have such problems. Someone must fix the code. I only use CUDA version.
newbie
Activity: 11
Merit: 0
the program skip private keys in amd rx580 but working fine with nvidia gtx 950m
anyone knows why?

amd rx580 command :
clbitcrack  -c -u -i test18.txt -o out.txt --device 1 --keyspace 2:FF

test18.txt contain:
1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH 0x1
1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP  0x2
1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb 0x3
1JtK9CQw1syfWj1WtFMWomrYdV3W2tWBF9 0x4
17Vu7st1U1KwymUKU4jJheHHGRVNqrcfLD 0x5
1Cf2hs39Woi61YNkYGUAcohL2K2q4pawBq 0x6
19ZewH8Kk1PDbSNdJ97FP4EiCjTRaZMZQA 0x7
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e 0x8
1HSxWThjiwbC4dJbXHMpBfwRenB12UguG5 0x9
13DaZ9nfmJLfzU6oBnD2sdCiDmf3M5fmLx 0xa
15wPJhwthAkBtUgx3qFEyCtnK7piuu6Xvr 0xb
1M9sZKsStVRZyBZSSVe13XMGRtCHkNj7VD 0xc
18xiXDdYhapNJoAp4UAkJa1WZT9U9FmQiD 0xd
1BS2vyPFUSDKfJKw35MyAAUvSzXpcBLgSJ 0xe
1FZoTz4UBrfjpf7DdGGuLdPBqSMx65tKuy 0xf
19p7ktDbdJnmV4YLC7zQ37RsYczMZJmd6q 0x11
18FtYoEJipP5bCJnjgWdeeEbxSvozSjEUA 0x12
1Ny3b8r8HhkQtwUBePqKdU31qBV1xWS64Q 0x13

output:
1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP 0000000000000000000000000000000000000000000000000000000000000002 02C6047F9441ED7D6D3045406E95C07CD85C778E4B8CEF3CA7ABAC09B95C709EE5
1JtK9CQw1syfWj1WtFMWomrYdV3W2tWBF9 0000000000000000000000000000000000000000000000000000000000000004 02E493DBF1C10D80F3581E4904930B1404CC6C13900EE0758474FA94ABE8C4CD13
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e 0000000000000000000000000000000000000000000000000000000000000008 022F01E5E15CCA351DAFF3843FB70F3C2F0A1BDD05E5AF888A67784EF3E10A2A01
19p7ktDbdJnmV4YLC7zQ37RsYczMZJmd6q 0000000000000000000000000000000000000000000000000000000000000010 03E60FCE93B59E9EC53011AABC21C23E97B2A31369B87A5AE9C44EE89E2A6DEC0A
newbie
Activity: 11
Merit: 0
Why doesn't anyone answer? !!
newbie
Activity: 11
Merit: 0
this is test.txt:
1NZUP3JAc9JkmbvmoTv7nVgZGtyJjirKV1
1E1NUNmYw1G5c3FKNPd435QmDvuNG3auYk
1UCZSVufT1PNimutbPdJUiEyCYSiZAD6n
1BYbgHpSKQCtMrQfwN6b6n5S718EJkEJ41
1CijKR7rDvJJBJfSPyUYrWC8kAsQLy2B2e
18XrReT5ChW8qgXecNgKTU5T6MrMMLnV8H
1LwjY8QPCW46jXn79eeN5SfZDsYNB9qDj1
1BBwZVdBjoPxotHfrKLpHJBSy7vmc2pjex
13zGBax475zUoLFatjye7Rp48vPrtiaeqs
1LWWyaRPtU7PHHEN67Zh8qhmZyAoaRubcw
1PRWyFKTsQSJaUdX9VKgQNw8JERPw2kMFm
1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH
1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP
1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb
1JtK9CQw1syfWj1WtFMWomrYdV3W2tWBF9
1FZoTz4UBrfjpf7DdGGuLdPBqSMx65tKuy
1dphfxwf4nsjaz5kaRcbaKTTKMVoMhV2s
15MRQkVBF9crVPeHDjSEVEytCTVLJVGZSr
1KpcN5j4Gpyd41Zy5gxtwDmmXArnWdUVdd
1P3MHqc6mWZvaaTE6WToE7mZ4gympSTYKd
15ZBLL7iGGDxRZnW9tfjg57Qd6sbW7PpT6
1JYv2WeCcgH6spfCYCbY4hitpHuv8CuJZd
1AH93tcUoyFtioff7U5aucuQLkFL2rnDpn
1JsVmS1ikcrCvFixmxKigj4Ptn1iskMFkd
1SoKYWJgDfNYBu5U5CGXVXreHDuQk3oKP
1BmbJALWJ7hUKRVTpWvh28thELrey8ztzz
1GDr44Gi7LLdFBmPfkTqCsbo9kz5N2MqCB
1MUcnm3p2ukBcydymqJrFAWJviTQe7appn
1FJPqZKbJMP4Q44Jm5gJrnovnQBzuULQwG
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e
19p7ktDbdJnmV4YLC7zQ37RsYczMZJmd6q



the software working in Geforce Graphics but not  working with AMD Radeon RX 580 8GB,
My test output doesn't work correctly on AMD graphics card
I think there is a problem with openCL

this is my result with AMD RX 580 GB that Skips pravite key

1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH 0000000000000000000000000000000000000000000000000000000000000001 0279BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798
15ZBLL7iGGDxRZnW9tfjg57Qd6sbW7PpT6 0000000000000000000000000000000000000000000000000000000000002000 02423A013F03FF32D7A5FFBCC8E139C62130FDFEB5C6DA121BCE78049E46BC47D6
1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP 0000000000000000000000000000000000000000000000000000000000000002 02C6047F9441ED7D6D3045406E95C07CD85C778E4B8CEF3CA7ABAC09B95C709EE5
1JtK9CQw1syfWj1WtFMWomrYdV3W2tWBF9 0000000000000000000000000000000000000000000000000000000000000004 02E493DBF1C10D80F3581E4904930B1404CC6C13900EE0758474FA94ABE8C4CD13
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e 0000000000000000000000000000000000000000000000000000000000000008 022F01E5E15CCA351DAFF3843FB70F3C2F0A1BDD05E5AF888A67784EF3E10A2A01
19p7ktDbdJnmV4YLC7zQ37RsYczMZJmd6q 0000000000000000000000000000000000000000000000000000000000000010 03E60FCE93B59E9EC53011AABC21C23E97B2A31369B87A5AE9C44EE89E2A6DEC0A
1JYv2WeCcgH6spfCYCbY4hitpHuv8CuJZd 0000000000000000000000000000000000000000000000000000000000010000 03363D90D447B00C9C99CEAC05B6262EE053441C7E55552FFE526BAD8F83FF4640

this is my result with Geforce 950 AND Working Fine

1NZUP3JAc9JkmbvmoTv7nVgZGtyJjirKV1 0000000000000000000000000000000000000000000000000000000000000003 04F9308A019258C31049344F85F89D5229B531C845836F99B08601F113BCE036F9388F7B0F632DE 8140FE337E62A37F3566500A99934C2231B6CB9FD7584B8E672
1E1NUNmYw1G5c3FKNPd435QmDvuNG3auYk 0000000000000000000000000000000000000000000000000000000000000005 042F8BDE4D1A07209355B4A7250A5C5128E88B84BDDC619AB7CBA8D569B240EFE4D8AC222636E5E 3D6D4DBA9DDA6C9C426F788271BAB0D6840DCA87D3AA6AC62D6
1UCZSVufT1PNimutbPdJUiEyCYSiZAD6n 0000000000000000000000000000000000000000000000000000000000000006 04FFF97BD5755EEEA420453A14355235D382F6472F8568A18B2F057A1460297556AE12777AACFBB 620F3BE96017F45C560DE80F0F6518FE4A03C870C36B075F297
1BYbgHpSKQCtMrQfwN6b6n5S718EJkEJ41 0000000000000000000000000000000000000000000000000000000000000007 045CBDF0646E5DB4EAA398F365F2EA7A0E3D419B7E0330E39CE92BDDEDCAC4F9BC6AEBCA40BA255 960A3178D6D861A54DBA813D0B813FDE7B5A5082628087264DA
1CijKR7rDvJJBJfSPyUYrWC8kAsQLy2B2e 0000000000000000000000000000000000000000000000000000000000000009 04ACD484E2F0C7F65309AD178A9F559ABDE09796974C57E714C35F110DFC27CCBECC338921B0A7D 9FD64380971763B61E9ADD888A4375F8E0F05CC262AC64F9C37
18XrReT5ChW8qgXecNgKTU5T6MrMMLnV8H 0000000000000000000000000000000000000000000000000000000000000010 04E60FCE93B59E9EC53011AABC21C23E97B2A31369B87A5AE9C44EE89E2A6DEC0AF7E3507399E59 5929DB99F34F57937101296891E44D23F0BE1F32CCE69616821
1LwjY8QPCW46jXn79eeN5SfZDsYNB9qDj1 0000000000000000000000000000000000000000000000000000000000000011 04DEFDEA4CDB677750A420FEE807EACF21EB9898AE79B9768766E4FAA04A2D4A344211AB0694635 168E997B0EAD2A93DAECED1F4A04A95C0F6CFB199F69E56EB77
1BBwZVdBjoPxotHfrKLpHJBSy7vmc2pjex 0000000000000000000000000000000000000000000000000000000000000012 045601570CB47F238D2B0286DB4A990FA0F3BA28D1A319F5E7CF55C2A2444DA7CCC136C1DC0CBEB 930E9E298043589351D81D8E0BC736AE2A1F5192E5E8B061D58
13zGBax475zUoLFatjye7Rp48vPrtiaeqs 0000000000000000000000000000000000000000000000000000000000000013 042B4EA0A797A443D293EF5CFF444F4979F06ACFEBD7E86D277475656138385B6C85E89BC037945 D93B343083B5A1C86131A01F60C50269763B570C854E5C09B7A
1LWWyaRPtU7PHHEN67Zh8qhmZyAoaRubcw 0000000000000000000000000000000000000000000000000000000000000014 044CE119C96E2FA357200B559B2F7DD5A5F02D5290AFF74B03F3E471B273211C9712BA26DCB10EC 1625DA61FA10A844C676162948271D96967450288EE9233DC3A
1BgGZ9tcN4rm9KBzDn7KprQz87SZ26SAMH 0000000000000000000000000000000000000000000000000000000000000001 0279BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798
1cMh228HTCiwS8ZsaakH8A8wze1JR5ZsP 0000000000000000000000000000000000000000000000000000000000000002 02C6047F9441ED7D6D3045406E95C07CD85C778E4B8CEF3CA7ABAC09B95C709EE5
1CUNEBjYrCn2y1SdiUMohaKUi4wpP326Lb 0000000000000000000000000000000000000000000000000000000000000003 02F9308A019258C31049344F85F89D5229B531C845836F99B08601F113BCE036F9
1JtK9CQw1syfWj1WtFMWomrYdV3W2tWBF9 0000000000000000000000000000000000000000000000000000000000000004 02E493DBF1C10D80F3581E4904930B1404CC6C13900EE0758474FA94ABE8C4CD13
1EhqbyUMvvs7BfL8goY6qcPbD6YKfPqb7e 0000000000000000000000000000000000000000000000000000000000000008 022F01E5E15CCA351DAFF3843FB70F3C2F0A1BDD05E5AF888A67784EF3E10A2A01
1FZoTz4UBrfjpf7DdGGuLdPBqSMx65tKuy 000000000000000000000000000000000000000000000000000000000000000F 02D7924D4F7D43EA965A465AE3095FF41131E5946F3C85F79E44ADBCF8E27E080E
19p7ktDbdJnmV4YLC7zQ37RsYczMZJmd6q 0000000000000000000000000000000000000000000000000000000000000010 03E60FCE93B59E9EC53011AABC21C23E97B2A31369B87A5AE9C44EE89E2A6DEC0A
15MRQkVBF9crVPeHDjSEVEytCTVLJVGZSr 000000000000000000000000000000000000000000000000000000000000001F 026A245BF6DC698504C89A20CFDED60853152B695336C28063B61C65CBD269E6B4
15ZBLL7iGGDxRZnW9tfjg57Qd6sbW7PpT6 0000000000000000000000000000000000000000000000000000000000002000 02423A013F03FF32D7A5FFBCC8E139C62130FDFEB5C6DA121BCE78049E46BC47D6
1AH93tcUoyFtioff7U5aucuQLkFL2rnDpn 0000000000000000000000000000000000000000000000000000000000010000 04363D90D447B00C9C99CEAC05B6262EE053441C7E55552FFE526BAD8F83FF464004E273ADFC732 221953B445397F3363145B9A89008199ECB62003C7F3BEE9DE9
1JYv2WeCcgH6spfCYCbY4hitpHuv8CuJZd 0000000000000000000000000000000000000000000000000000000000010000 03363D90D447B00C9C99CEAC05B6262EE053441C7E55552FFE526BAD8F83FF4640
1JsVmS1ikcrCvFixmxKigj4Ptn1iskMFkd 0000000000000000000000000000000000000000000000000000000000100000 028B4B5F165DF3C2BE8C6244B5B745638843E4A781A15BCD1B69F79A55DFFDF80C
1SoKYWJgDfNYBu5U5CGXVXreHDuQk3oKP 0000000000000000000000000000000000000000000000000000000000200000 03ED0C5CE4E13291718CE17C7EC83C611071AF64EE417C997ABB3F26714755E4BE
1BmbJALWJ7hUKRVTpWvh28thELrey8ztzz 0000000000000000000000000000000000000000000000000000000001000000 03723CBAA6E5DB996D6BF771C00BD548C7B700DBFFA6C0E77BCB6115925232FCDA

Pages:
Jump to: