Need Help?

Whole-transcriptome characterization of cell-free RNA (cfRNA) in cancer and non-cancer patients

Whole-transcriptome characterization of cfRNA in cancer (stage III breast [n=46], lung [n=30]) and non-cancer (n=89) participants from the Circulating Cell-free Genome Atlas (NCT02889978). Dataset includes collapsed BAM files for plasma cfRNA from each patient, as well as collapsed BAM files for RNA from matched tumor tissue (when available).

Request Access

GRAIL Data Access Agreement

DATA ACCESS AGREEMENT These terms and conditions govern access to and processing of the managed access datasets (details of which are set out in Appendix I) to which the User Institution has requested access. The User Institution agrees to be bound by these terms and conditions and any appendices or addenda hereto, which are hereby incorporated (collectively, the “Agreement”). Definitions Authorised Personnel: Only those individuals employed at the User Institution to whom the GRAIL Data Access Review Committee grants access to the Data. This is limited to the User, the individuals listed in Appendix II and any other individuals at User Institution for whom the User Institution subsequently requests access to the Data and to whom GRAIL Data Access Review Committee agrees in writing to grant access. Data: The managed access datasets to which the User Institution has requested access. Data Producer: GRAIL, which is responsible for the development, organization, and oversight of these Data through the GRAIL Data Access Review Committee. External Collaborator: A collaborator of the User, working for an institution other than the User Institution. GRAIL: Means GRAIL, Inc. a Delaware company, with offices at 1525 O’Brien Drive, Menlo Park, CA 94025 GRAIL Data Access Review Committee: Means the access committee consisting of representatives from GRAIL to govern and decide whether to approve access to the Data for a particular Project. Project: The project for Research Purposes for which the User Institution has requested access to these Data, as set out expressly in Appendix II. Publications: Includes, without limitation, articles published in print journals, electronic journals, reviews, books, posters and other written and verbal presentations of research. Representative: An individual on the GRAIL Data Access Review Committee, or his or her designee, as may be specified in Appendix I. Research Participant: An individual whose data form part of these Data. Research Purposes: Shall mean research that is seeking to advance the understanding of genetics and genomics, including the treatment of disorders, and work on statistical methods that may be applied to such research. User: The principal investigator for the Project. User Institution(s): The Institution that has requested access to the Data. 1. The User Institution agrees to not to use these Data except for the purpose of the Project, which, for clarity is only for Research Purposes. The User Institution further agrees that it will only use these Data for Research Purposes. For clarity, Research Purposes expressly excludes use of any Data for any activity undertaken for or directed to commercial gain, including product development. 2. The User Institution agrees to preserve, at all times, the confidentiality of these Data. In particular, it undertakes not to use, or attempt to use these Data to compromise or otherwise infringe the confidentiality of information on Research Participants. Without prejudice to the generality of the foregoing, the User Institution agrees to perform in accordance with the Privacy and Data Security Addendum set out in Attachment 1 (the “Data Addendum”) with respect to any Processing (as defined in the Addendum) of Data. 3. The User Institution agrees to protect the confidentiality of Research Participants in any research papers or publications that User Institutions prepares by taking all reasonable care to limit the possibility of identification of Research Participants. 4. The User Institution agrees not to link or combine these Data to other information or archived data available in a way that could re-identify the Research Participants, even if access to that data has been formally granted to the User Institution or is freely available without restriction. 5. The User Institution agrees not to transfer or disclose these Data, in whole or part, or any material derived from these Data, except to the Authorised Personnel. User Institution shall not share these Data with an External Collaborator. Any External Collaborator must complete a separate application for access to these Data. 6. The User Institution agrees that the Data Producer, and all other parties involved in the creation, funding or protection of these Data: a) make no warranty or representation, express or implied as to the accuracy, quality or comprehensiveness of these Data; b) exclude to the fullest extent permitted by law all liability for actions, claims, proceedings, demands, losses (including but not limited to loss of profit), costs, awards damages and payments made by the Recipient that may arise (whether directly or indirectly) in any way whatsoever from the Recipient’s use of these Data or from the unavailability of, or break in access to, these Data for whatever reason and; c) bear no responsibility for the further analysis or interpretation of these Data. 7. The User Institution agrees to follow the Fort Lauderdale Guidelines (http://www.wellcome.ac.uk/stellent/groups/corporatesite/@policy_communications/documents/web_document/wtd003207.pdf ) and the Toronto Statement (http://www.nature.com/nature/journal/v461/n7261/full/461168a.html). This includes but is not limited to recognising the contribution of the Data Producer and including a proper acknowledgement in all reports or publications resulting from the use of these Data. 8. The User Institution agrees to follow the Publication Policy in Appendix III. This includes respecting the moratorium period for the Data Producer to publish the first peer-reviewed report describing and analyzing these Data. 9. The User Institution agrees not to make intellectual property claims on these Data and not to use intellectual property protection in ways that would prevent or block access to, or use of, any element of these Data, or any discovery or conclusion drawn directly or indirectly from these Data. In the event User Institution does make such claims or uses in the ways prohibited in this section above, the User Institution hereby grants to GRAIL a non-exclusive, worldwide, royalty-free, fully sublicensable license to any resulting or related intellectual property rights, including in any such Data related claims and in any such discoveries or conclusions. 10. The User Institution will notify Representative within 30 days of any changes or departures of Authorised Personnel. 11. Without limiting anything in the Addendum, the User Institution will notify Representative if it desires to make any significant changes to the Project. 12. The User Institution will notify Representative as soon as it becomes aware of a breach of the terms or conditions of this Agreement. 13. GRAIL or Representative may terminate this Agreement by written notice to the User Institution. 14. The User Institution accepts that it may be necessary for the Data Producer to alter the terms of this Agreement from time to time. As an example, this may include specific provisions relating to the Data required by Data Producer other than GRAIL. In the event that changes are required, the Data Producer, or Representative, or a designee will contact the User Institution to inform it of the changes and the User Institution may elect to accept the changes or terminate the Agreement. 15. The User Institution agrees to distribute a copy of these terms to the Authorised Personnel. The User Institution will procure that the Authorised Personnel comply with the terms of this Agreement. 16. This agreement (and any dispute, controversy, proceedings or claim of whatever nature arising out of this agreement or its formation) shall be construed, interpreted and governed by the laws of the State of California and shall be subject to the exclusive jurisdiction of the courts located in the State of California. APPENDIX I – DATA DETAILS Dataset reference (EGA Study ID and Dataset Details): EGAS00001004704 The dataset is comprised of primary sequencing data as well as phenotypic data. The files include collapsed bams for plasma and tissue samples. Name of project that created the Data: A comprehensive characterization of the cell-free transcriptome reveals tissue- and subtype-specific biomarkers for cancer detection Name of Representative: Matthew Larson Specific limitations on areas of research: GRAIL Data Access Review Committee may specify additional limitations on areas of research with respect to the Data from time to time. User Institution will be informed of any such limitations and the User Institution may elect to accept the limitations or terminate the Agreement. Minimum protection measures required: File access: Data can be held in unencrypted files on an institutional compute system, with Unix user group read/write access for one or more appropriate groups but not Unix world read/write access, behind a secure firewall. Laptops holding these data should have password protected logins and screenlocks (set to lock after 5 min of inactivity). If held on USB keys or other portable hard drives, the data must be encrypted. APPENDIX II – PROJECT DETAILS (to be completed by the Requestor) Details of Data requested i.e., EGA Study and Dataset Accession Number Brief abstract of the Project in which the Data will be used (500 words max) All Individuals who the User Institution to be named as registered users All Individuals that should have an account created at the EGA APPENDIX III – PUBLICATION POLICY GRAIL intends to publish the results of its analysis of this Data and do not consider its deposition into public databases to be the equivalent of such publications. GRAIL anticipates that the Data could be useful to other qualified researchers for a variety of purposes. However, some areas of work are subject to a publication moratorium. The publication moratorium covers any publications that describe the use of the dataset, and neither User Institution nor any User shall make any disclosures (including press releases) or publications (including abstract, poster, or oral communications) that describe the use of the Data or results of the Project, except as permitted herein. For research papers, abstracts, or poster/oral communications, submission for publication or presentation by User Institution and/or User shall not occur until 18 months after these Data and analyses therefrom are first made public in manuscript by GRAIL (at which point the moratorium is deemed to have ended), unless the Representative has provided written consent to earlier submission. In any publications based on these Data, please describe how the Data can be accessed, including the name of the hosting database (e.g., The European Genome-phenome Archive at the European Bioinformatics Institute) and its accession numbers (e.g., EGAS00001004704), and acknowledge its use in a form reviewed and approved by the User Institution via the Representative prior to publication. Privacy and Data Security Addendum This Privacy and Data Security Addendum (this “Addendum”) is made a part of the GRAIL Data Access Agreement entered into by and between GRAIL and User Institution(the "Underlying Agreement"). Capitalized terms used in this Addendum and not otherwise defined shall have the meaning set forth in the body of the Underlying Agreement. To the extent this Addendum and the Underlying Agreement contain any terms that conflict regarding the Processing of Data (as each term is defined below), this Addendum will govern with regard to such conflict. RECITALS WHEREAS, User Institution endeavors to use Data to perform the Project and GRAIL has agreed to make Data available to User Institution for use in conducting, or in furtherance of, the Project subject to the terms and conditions set forth below. NOW, THEREFORE, in consideration of the above, and of the mutual covenants and promises contained herein and other good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged, the parties agree as follows: 1. DEFINITIONS 1.1. “Applicable Privacy and Data Security Laws” means laws, orders, regulations, or other requirements with similar effect of any governmental authority that limit, restrict, or otherwise govern the collection, use, disclosure, security, storage, protection, or disclosure of Data. 1.2. “Data Breach” means any: (i) compromise of the security, confidentiality or integrity of, unauthorized access to, unauthorized acquisition of, or unauthorized or unlawful Processing of Data; (ii) unauthorized intrusion into, control of, access to, modification of, or use of any System used by User Institution to secure, defend, protect or Process Data; or (iii) event leading User Institution to suspect that either (i) or (ii) has occurred. 1.3. “User Institution Systems” means any System owned, licensed, operated, or controlled by or on behalf of User Institution that Processes Data. 1.4. “Process,” “Processed” or “Processing” means any operation or set of operations which is performed upon Data, such as creation, collection, access, disclosure, recording, organization, storage, maintenance, use, retrieval, transmission, erasure, retention, or destruction. 1.5. “System” means any file system, computing system, database, device, equipment, server, website, application, software, storage media, network, infrastructure, networked environment, or domain. 2. CONFIDENTIALITY 2.1. Compliance with Laws. User Institution hereby represents, warrants, and covenants that it is and will remain at all times during the term of this Agreement, and at all times after the term of this Agreement to the extent it Processes any Data, in compliance with all Applicable Privacy and Data Security Laws. 2.2. Use of Data. User Institution will not Process Data for any purpose other than as minimally necessary to conduct the Project, as expressly granted in the Underlying Agreement, or as otherwise required by applicable law. 2.3. Disclosure of Data. User Institution will not disclose Data to any person other than its Authorized Personnel, except as expressly permitted in this Addendum. 2.3.1. Access Restrictions. User Institution will implement and maintain technical access limitations subject to logging and auditing to ensure only Authorized Personnel have access to Data. User Institution agrees GRAIL may request at any time the list of individuals authorized to have access to Data, including their level of access. If any of User Institution's System containing Data is backed up, that backup will maintain similar levels of access controls. 2.3.2. Disclosures by User Institution to Permitted Subcontractors. User Institution may disclose Data to subcontractors that have a need to Process that Data in order to conduct the Project, provided that each permitted subcontractor that receives Data is contractually bound to comply with privacy, confidentiality and data security terms no less restrictive than the terms set forth in this Addendum. In the event that User Institution provides Data to any permitted subcontractor, User Institution will not be relieved of any of its obligations under this Agreement with regard to that Data, will remain liable and responsible for the performance of all of its obligations under this Agreement with regard to that Data, and will be liable to GRAIL for any acts or omissions of its subcontractors in relation to that Data. 2.3.3. Disclosures Required by Law. User Institution may disclose Data to a governmental authority if that disclosure is required by law, provided that: (i) to the extent permitted by law, User Institution provides prior written notice of such disclosure to GRAIL; (ii) User Institution takes all reasonable and lawful actions to avoid, and minimize the extent of, that disclosure; and (iii) before disclosing Data to the governmental authority User Institution reasonably cooperates with GRAIL to resist that disclosure if GRAIL chooses to do so. 2.4. Return or Destruction of Data. Upon GRAIL’s request, the termination or expiration of the Underlying Agreement, or whenever User Institution no longer needs to retain all or part of Data, unless prohibited under applicable law, User Institution will immediately destroy that Data including any Data maintained in backup form. User Institution will destroy Data using a final, secure and complete method that will render that Data permanently unrecoverable. 2.5. Re-Identification. User Institution acknowledges and agrees that Data will not contain any individually identifiable health information. User Institution will not attempt to re-identify any individuals whose health related information is contained within the Data. To the extent Data contains any individually identifiable health information, User Institution will notify GRAIL immediately at privacy@grailbio.com. 2.6. Survival. This Section will survive any termination or expiration of the Underlying Agreement for so long as User Institution retains or otherwise Processes Data. 3. DATA SECURITY 3.1. Data Security Program. User Institution will implement, maintain, and comply with comprehensive information and network security programs, practices and procedures (collectively, “Data Security Program”). User Institution will ensure that the Data Security Program at all times: (i) meets current leading industry standards; and (ii) complies with all Applicable Privacy and Data Security Laws. User Institution will document its Data Security Program in written form and will make those documents available to GRAIL for review upon GRAIL’s request from time to time. User Institution will keep its Data Security Program current and up-to-date in order to continually improve the security of the Data Security Program, but in no event will User Institution render the Data Security Program less comprehensive, secure, or robust. 3.2. Safeguards. Without limiting the generality of subsection 3.1, User Institution represents, warrants, and covenants that it has adopted and implemented, and will continue to maintain, physical, administrative, and technical safeguards and other security measures to: 3.2.1. maintain the security and confidentiality of Data and protect it from threats or hazards to its security and integrity, as well as accidental loss, alteration, disclosure, and all other unlawful forms of Processing; 3.2.2. require Authorized Personnel to receive annual training regarding: (i) how to protect User Institution's Systems from security threats, (ii) their responsibilities regarding the protection of research data; and (iii) industry standard protocols for Processing research data; 3.2.3. prevent, detect, contain, recover, remediate, and respond to a Data Breach; 3.2.4. enforce the use of secure authentication protocols and access control measures, consistent with industry standards, on any User Institution Systems that protect, defend, secure, or Process Data; 3.2.5. implement regular and timely software security patches on any User Institution Systems that protect, defend, secure, or otherwise Process Data; 3.2.6. require the use of encryption for all storage and transmission of Data; and 3.2.7. include automated security measures, including, but not limited to, standard perimeter monitoring and protection systems, auditing systems, firewalls, and security agent software capable of detecting and mitigating threats from viruses, spyware, and other malicious code on any User Institution Systems. 3.3. Survival. This Section will survive any termination or expiration of the Underlying Agreement for so long as User Institution retains or otherwise Processes Data. 4. DATA BREACH OBLIGATIONS 4.1. Notice. User Institution will notify GRAIL at it-sec@grailbio.com immediately, but in no event more than five (5) business days, after it is notified of or discovers a Data Breach. The notification to GRAIL will include the following, to the extent known by User Institution, and will be supplemented on an ongoing basis: (i) the general circumstances and extent of any unauthorized Processing of Data or intrusion into Systems used by User Institution to protect or Process Data; (ii) the types and volume of Data that were involved; (iii) User Institution’s plans for corrective actions to respond to the Data Breach; (iv) steps taken to secure Data and preserve information for any necessary investigation; and (v) any other related information reasonably requested by GRAIL. 4.2. Remediation. User Institution will immediately detect, respond to, and contain all vulnerabilities, activities, or other circumstances that caused or gave rise to the Data Breach. User Institution will promptly and without unreasonable delay take all necessary and advisable corrective actions, and will reasonably cooperate with GRAIL in all reasonable and lawful efforts to prevent, eradicate, mitigate, and rectify such Data Breach. 4.3. Notice to Other Parties. User Institution will not notify any parties other than GRAIL and, to the extent required by law, relevant law enforcement agencies of any Data Breach unless such notification is agreed to in advance by GRAIL in writing. 4.4. Investigation. User Institution will investigate the causes of each Data Breach at User Institution’s expense. Upon GRAIL’s request, User Institution will provide GRAIL with in-depth supplementary reports regarding its investigation of the Data Breach and results of findings. 4.5. Survival. This Section will survive any termination or expiration of the Underlying Agreement for so long as User Institution retains or otherwise Processes Data. 5. AUDITS AND INSPECTIONS 5.1. Audit Records. User Institution will retain System audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information System activity and ensure that the actions of individual users of User Institution Systems can be uniquely traced. 5.2. Annual User Institution Audit Report. User Institution hereby represents, warrants, and covenants that: (i) User Institution will undergo annual (or more frequent) audits of User Institution Systems, facilities, policies, practices, controls, and practices (each, a “User Institution Audit”) and that audit will include in its scope all User Institution Systems and all of User Institution’s practices, controls, policies, and procedures relating to the protection, security, defense, or Processing of Data; and (ii) the User Institution Audits will include, at a minimum, risk assessments, security control effectiveness, credentialed vulnerability scans, and security controls map to an industry standard (such as NIST, HITRUST, ISO, or SOC2). 5.3. Ongoing Inspections. User Institution will, consistent with best industry practices, continuously monitor and inspect all User Institution Systems to identify security vulnerabilities (“Ongoing Inspections”). 5.4. Audit Remediation. To the extent that a User Institution Audit or Ongoing Inspection identifies any "material", "critical", or "high" security vulnerabilities, User Institution will remediate those vulnerabilities as promptly as reasonably possible not to exceed ninety (90) days. If security vulnerabilities cannot be remediated or contained by the User Institution within that period, User Institution should promptly notify GRAIL at it-sec@grailbio.com of the increased risk. 5.5. Survival. This Section will survive any termination or expiration of the Underlying Agreement for so long as User Institution retains or otherwise Processes Data. 6. INDEMNIFICATION 6.1. Indemnity. Notwithstanding any provisions of this Agreement to the contrary, including but not limited to any limitation of liability or indemnity set forth in the Underlying Agreement, User Institution will defend, indemnify, and hold harmless GRAIL and its respective officers, directors, employees, and agents from and against all liabilities, obligations, losses, damages, costs, fees, penalties, fines, charges, or other expenses of any kind (including but not limited to costs and in-house or outside attorneys’ fees) resulting or arising from, relating to, or in connection with any actual or alleged: (i) Data Breach; or (ii) breach of this Addendum. 6.2. Additional Expenses. In addition to its indemnification obligations above, User Institution will pay for all costs and expenses reasonably incurred by GRAIL in connection with a Data Breach as they are incurred, including but not limited to forensics services and costs associated with investigating and responding to investigations and inquiries related to the Data Breach from federal and state regulatory authorities. 6.3. Survival. This Section will survive the termination or expiration of the Underlying Agreement.

Studies are experimental investigations of a particular phenomenon, e.g., case-control studies on a particular trait or cancer research projects reporting matching cancer normal genomes from patients.

Study ID Study Title Study Type
Other

This table displays only public information pertaining to the files in the dataset. If you wish to access this dataset, please submit a request. If you already have access to these data files, please consult the download documentation.

ID File Type Size Located in
EGAF00004726131 bam 7.3 GB
EGAF00004726132 bai 7.8 MB
EGAF00004726133 bam 106.9 GB
EGAF00004726134 bai 14.9 MB
EGAF00004726135 bam 14.2 GB
EGAF00004726136 bai 8.7 MB
EGAF00004726137 bam 92.9 GB
EGAF00004726138 bai 15.4 MB
EGAF00004726139 bam 12.6 GB
EGAF00004726140 bai 8.6 MB
EGAF00004726141 bam 90.8 GB
EGAF00004726142 bai 15.1 MB
EGAF00004726143 bam 33.9 GB
EGAF00004726144 bai 11.1 MB
EGAF00004726145 bam 69.3 GB
EGAF00004726146 bai 13.6 MB
EGAF00004726147 bam 20.1 GB
EGAF00004726148 bai 10.0 MB
EGAF00004726149 bam 29.1 GB
EGAF00004726150 bai 8.7 MB
EGAF00004726151 bam 95.2 GB
EGAF00004726152 bai 14.6 MB
EGAF00004726153 bam 21.5 GB
EGAF00004726154 bai 10.9 MB
EGAF00004726155 bam 62.3 GB
EGAF00004726156 bai 16.2 MB
EGAF00004726157 bam 13.3 GB
EGAF00004726158 bai 8.0 MB
EGAF00004726159 bam 68.0 GB
EGAF00004726160 bai 13.4 MB
EGAF00004726161 bam 23.7 GB
EGAF00004726162 bai 10.8 MB
EGAF00004726163 bam 80.4 GB
EGAF00004726164 bai 13.5 MB
EGAF00004726165 bam 33.4 GB
EGAF00004726166 bai 9.9 MB
EGAF00004726167 bam 85.5 GB
EGAF00004726168 bai 14.4 MB
EGAF00004726169 bam 17.7 GB
EGAF00004726170 bai 7.9 MB
EGAF00004726171 bam 45.3 GB
EGAF00004726172 bai 14.1 MB
EGAF00004726173 bam 31.2 GB
EGAF00004726174 bai 8.6 MB
EGAF00004726175 bam 81.0 GB
EGAF00004726176 bai 13.9 MB
EGAF00004726177 bam 38.0 GB
EGAF00004726178 bai 11.2 MB
EGAF00004726179 bam 92.5 GB
EGAF00004726180 bai 15.3 MB
EGAF00004726181 bam 43.6 GB
EGAF00004726182 bai 13.6 MB
EGAF00004726183 bam 95.2 GB
EGAF00004726184 bai 15.5 MB
EGAF00004726185 bam 25.5 GB
EGAF00004726186 bai 7.7 MB
EGAF00004726187 bam 94.6 GB
EGAF00004726188 bai 16.2 MB
EGAF00004726189 bam 29.4 GB
EGAF00004726190 bai 8.9 MB
EGAF00004726191 bam 88.2 GB
EGAF00004726192 bai 14.5 MB
EGAF00004726193 bam 8.8 GB
EGAF00004726194 bai 7.2 MB
EGAF00004726195 bam 90.3 GB
EGAF00004726196 bai 16.1 MB
EGAF00004726197 bam 18.8 GB
EGAF00004726198 bai 10.0 MB
EGAF00004726199 bam 82.1 GB
EGAF00004726200 bai 14.7 MB
EGAF00004726201 bam 28.9 GB
EGAF00004726202 bai 8.6 MB
EGAF00004726203 bam 45.9 GB
EGAF00004726204 bai 11.3 MB
EGAF00004726205 bam 37.7 GB
EGAF00004726206 bai 10.8 MB
EGAF00004726207 bam 92.8 GB
EGAF00004726208 bai 15.6 MB
EGAF00004726209 bam 12.0 GB
EGAF00004726210 bai 7.7 MB
EGAF00004726211 bam 95.1 GB
EGAF00004726212 bai 15.7 MB
EGAF00004726213 bam 10.3 GB
EGAF00004726214 bai 7.7 MB
EGAF00004726215 bam 41.2 GB
EGAF00004726216 bai 14.2 MB
EGAF00004726217 bam 84.5 GB
EGAF00004726218 bai 14.9 MB
EGAF00004726219 bam 38.1 GB
EGAF00004726220 bai 13.0 MB
EGAF00004726221 bam 112.4 GB
EGAF00004726222 bai 15.7 MB
EGAF00004726223 bam 32.7 GB
EGAF00004726224 bai 12.6 MB
EGAF00004726225 bam 79.5 GB
EGAF00004726226 bai 14.9 MB
EGAF00004726227 bam 24.8 GB
EGAF00004726228 bai 8.9 MB
EGAF00004726229 bam 88.2 GB
EGAF00004726230 bai 14.4 MB
EGAF00004726231 bam 34.4 GB
EGAF00004726232 bai 8.8 MB
EGAF00004726233 bam 15.1 GB
EGAF00004726234 bai 7.4 MB
EGAF00004726235 bam 96.2 GB
EGAF00004726236 bai 15.9 MB
EGAF00004726237 bam 18.9 GB
EGAF00004726238 bai 9.2 MB
EGAF00004726239 bam 118.9 GB
EGAF00004726240 bai 16.8 MB
EGAF00004726241 bam 34.6 GB
EGAF00004726242 bai 11.2 MB
EGAF00004726243 bam 43.1 GB
EGAF00004726244 bai 11.5 MB
EGAF00004726245 bam 18.1 GB
EGAF00004726246 bai 7.7 MB
EGAF00004726247 bam 73.4 GB
EGAF00004726248 bai 14.3 MB
EGAF00004726249 bam 50.6 GB
EGAF00004726250 bai 14.1 MB
EGAF00004726251 bam 73.2 GB
EGAF00004726252 bai 14.0 MB
EGAF00004726253 bam 75.9 GB
EGAF00004726254 bai 14.3 MB
EGAF00004726255 bam 77.1 GB
EGAF00004726256 bai 13.6 MB
EGAF00004726257 bam 15.3 GB
EGAF00004726258 bai 10.3 MB
EGAF00004726259 bam 22.3 GB
EGAF00004726260 bai 11.4 MB
EGAF00004726261 bam 76.8 GB
EGAF00004726262 bai 13.9 MB
EGAF00004726263 bam 29.3 GB
EGAF00004726264 bai 11.9 MB
EGAF00004726265 bam 40.3 GB
EGAF00004726266 bai 11.5 MB
EGAF00004726267 bam 32.5 GB
EGAF00004726268 bai 8.6 MB
EGAF00004726269 bam 107.0 GB
EGAF00004726270 bai 16.5 MB
EGAF00004726271 bam 35.8 GB
EGAF00004726272 bai 11.7 MB
EGAF00004726273 bam 97.0 GB
EGAF00004726274 bai 15.7 MB
EGAF00004726275 bam 38.4 GB
EGAF00004726276 bai 9.1 MB
EGAF00004726277 bam 79.6 GB
EGAF00004726278 bai 14.8 MB
EGAF00004726279 bam 21.6 GB
EGAF00004726280 bai 9.2 MB
EGAF00004726281 bam 82.9 GB
EGAF00004726282 bai 13.4 MB
EGAF00004726283 bam 295.6 MB
EGAF00004726284 bai 1.6 MB
EGAF00004726285 bam 617.8 MB
EGAF00004726286 bai 1.7 MB
EGAF00004726287 bam 16.0 GB
EGAF00004726288 bai 8.6 MB
EGAF00004726289 bam 104.6 MB
EGAF00004726290 bai 1.6 MB
EGAF00004726291 bam 268.0 MB
EGAF00004726292 bai 1.6 MB
EGAF00004726293 bam 324.0 MB
EGAF00004726294 bai 1.7 MB
EGAF00004726295 bam 280.9 MB
EGAF00004726296 bai 1.6 MB
EGAF00004726297 bam 326.1 MB
EGAF00004726298 bai 1.7 MB
EGAF00004726299 bam 229.0 MB
EGAF00004726300 bai 1.6 MB
EGAF00004726301 bam 239.1 MB
EGAF00004726302 bai 1.6 MB
EGAF00004726303 bam 322.9 MB
EGAF00004726304 bai 1.7 MB
EGAF00004726305 bam 952.6 MB
EGAF00004726306 bai 1.7 MB
EGAF00004726307 bam 651.9 MB
EGAF00004726308 bai 1.6 MB
EGAF00004726309 bam 14.6 GB
EGAF00004726310 bai 9.9 MB
EGAF00004726311 bam 75.4 GB
EGAF00004726312 bai 14.2 MB
EGAF00004726313 bam 404.4 MB
EGAF00004726314 bai 1.5 MB
EGAF00004726315 bam 876.6 MB
EGAF00004726316 bai 1.6 MB
EGAF00004726317 bam 1.0 GB
EGAF00004726318 bai 1.8 MB
EGAF00004726319 bam 1.7 GB
EGAF00004726320 bai 1.8 MB
EGAF00004726321 bam 798.6 MB
EGAF00004726322 bai 1.7 MB
EGAF00004726323 bam 2.5 GB
EGAF00004726324 bai 1.9 MB
EGAF00004726325 bam 1.1 GB
EGAF00004726326 bai 1.8 MB
EGAF00004726327 bam 1.1 GB
EGAF00004726328 bai 1.7 MB
EGAF00004726329 bam 1.4 GB
EGAF00004726330 bai 1.8 MB
EGAF00004726331 bam 1.1 GB
EGAF00004726332 bai 1.7 MB
EGAF00004726333 bam 95.8 GB
EGAF00004726334 bai 14.9 MB
EGAF00004726335 bam 1.3 GB
EGAF00004726336 bai 1.8 MB
EGAF00004726337 bam 1.6 GB
EGAF00004726338 bai 1.8 MB
EGAF00004726339 bam 769.8 MB
EGAF00004726340 bai 1.6 MB
EGAF00004726341 bam 987.2 MB
EGAF00004726342 bai 1.7 MB
EGAF00004726343 bam 630.2 MB
EGAF00004726344 bai 1.6 MB
EGAF00004726345 bam 734.0 MB
EGAF00004726346 bai 2.0 MB
EGAF00004726347 bam 1.4 GB
EGAF00004726348 bai 1.8 MB
EGAF00004726349 bam 1.1 GB
EGAF00004726350 bai 1.7 MB
EGAF00004726351 bam 1.2 GB
EGAF00004726352 bai 2.0 MB
EGAF00004726353 bam 1.2 GB
EGAF00004726354 bai 1.9 MB
EGAF00004726355 bam 36.9 GB
EGAF00004726356 bai 9.3 MB
EGAF00004726357 bam 95.2 GB
EGAF00004726358 bai 14.5 MB
EGAF00004726359 bam 1.4 GB
EGAF00004726360 bai 1.8 MB
EGAF00004726361 bam 1.2 GB
EGAF00004726362 bai 2.9 MB
EGAF00004726363 bam 505.8 MB
EGAF00004726364 bai 2.1 MB
EGAF00004726365 bam 1.7 GB
EGAF00004726366 bai 2.0 MB
EGAF00004726367 bam 1.3 GB
EGAF00004726368 bai 1.9 MB
EGAF00004726369 bam 28.4 GB
EGAF00004726370 bai 10.4 MB
EGAF00004726371 bam 123.0 GB
EGAF00004726372 bai 16.4 MB
EGAF00004726373 bam 20.6 GB
EGAF00004726374 bai 9.8 MB
EGAF00004726375 bam 85.1 GB
EGAF00004726376 bai 14.7 MB
EGAF00004726377 bam 18.8 GB
EGAF00004726378 bai 10.9 MB
EGAF00004726379 bam 28.6 GB
EGAF00004726380 bai 7.7 MB
EGAF00004726381 bam 22.9 GB
EGAF00004726382 bai 11.2 MB
EGAF00004726383 bam 69.4 GB
EGAF00004726384 bai 13.8 MB
EGAF00004726385 bam 26.1 GB
EGAF00004726386 bai 8.3 MB
EGAF00004726387 bam 18.8 GB
EGAF00004726388 bai 7.6 MB
EGAF00004726389 bam 20.9 GB
EGAF00004726390 bai 8.9 MB
EGAF00004726391 bam 17.2 GB
EGAF00004726392 bai 7.0 MB
EGAF00004726393 bam 33.2 GB
EGAF00004726394 bai 10.2 MB
EGAF00004726395 bam 18.6 GB
EGAF00004726396 bai 9.1 MB
EGAF00004726397 bam 30.4 GB
EGAF00004726398 bai 8.4 MB
EGAF00004726399 bam 26.4 GB
EGAF00004726400 bai 12.4 MB
EGAF00004726401 bam 73.6 GB
EGAF00004726402 bai 14.4 MB
EGAF00004726403 bam 44.7 GB
EGAF00004726404 bai 14.1 MB
EGAF00004726405 bam 36.2 GB
EGAF00004726406 bai 10.5 MB
EGAF00004726407 bam 30.7 GB
EGAF00004726408 bai 11.6 MB
EGAF00004726409 bam 5.3 GB
EGAF00004726410 bai 5.9 MB
EGAF00004726411 bam 42.7 GB
EGAF00004726412 bai 11.5 MB
EGAF00004726413 bam 28.1 GB
EGAF00004726414 bai 9.8 MB
EGAF00004726415 bam 75.3 GB
EGAF00004726416 bai 13.9 MB
EGAF00004726417 bam 37.7 GB
EGAF00004726418 bai 10.9 MB
EGAF00004726419 bam 34.8 GB
EGAF00004726420 bai 14.0 MB
EGAF00004726421 bam 111.0 GB
EGAF00004726422 bai 15.3 MB
EGAF00004726423 bam 30.3 GB
EGAF00004726424 bai 12.2 MB
EGAF00004726425 bam 35.5 GB
EGAF00004726426 bai 12.6 MB
EGAF00004726427 bam 39.7 GB
EGAF00004726428 bai 9.2 MB
EGAF00004726429 bam 33.2 GB
EGAF00004726430 bai 12.8 MB
EGAF00004726431 bam 82.6 GB
EGAF00004726432 bai 13.9 MB
EGAF00004726433 bam 43.2 GB
EGAF00004726434 bai 13.8 MB
EGAF00004726435 bam 30.4 GB
EGAF00004726436 bai 9.1 MB
EGAF00004726437 bam 646.4 MB
EGAF00004726438 bai 2.0 MB
EGAF00004726439 bam 486.4 MB
EGAF00004726440 bai 1.8 MB
EGAF00004726441 bam 401.8 MB
EGAF00004726442 bai 1.8 MB
EGAF00004726443 bam 325.3 MB
EGAF00004726444 bai 1.8 MB
EGAF00004726445 bam 502.0 MB
EGAF00004726446 bai 1.8 MB
EGAF00004726447 bam 603.4 MB
EGAF00004726448 bai 1.8 MB
EGAF00004726449 bam 523.4 MB
EGAF00004726450 bai 1.9 MB
EGAF00004726451 bam 18.9 GB
EGAF00004726452 bai 8.0 MB
EGAF00004726453 bam 12.4 GB
EGAF00004726454 bai 7.7 MB
EGAF00004726455 bam 815.1 MB
EGAF00004726456 bai 1.9 MB
EGAF00004726457 bam 481.0 MB
EGAF00004726458 bai 1.8 MB
EGAF00004726459 bam 143.0 MB
EGAF00004726460 bai 2.8 MB
EGAF00004726461 bam 1.1 GB
EGAF00004726462 bai 2.0 MB
EGAF00004726463 bam 1.4 GB
EGAF00004726464 bai 2.1 MB
EGAF00004726465 bam 932.7 MB
EGAF00004726466 bai 2.5 MB
EGAF00004726467 bam 2.1 GB
EGAF00004726468 bai 5.6 MB
EGAF00004726469 bam 439.0 MB
EGAF00004726470 bai 1.7 MB
EGAF00004726471 bam 1.2 GB
EGAF00004726472 bai 1.9 MB
EGAF00004726473 bam 1.3 GB
EGAF00004726474 bai 1.9 MB
EGAF00004726475 bam 15.7 GB
EGAF00004726476 bai 9.7 MB
EGAF00004726477 bam 2.1 GB
EGAF00004726478 bai 2.7 MB
EGAF00004726479 bam 10.7 GB
EGAF00004726480 bai 9.0 MB
EGAF00004726481 bam 73.5 GB
EGAF00004726482 bai 14.7 MB
EGAF00004726483 bam 37.8 GB
EGAF00004726484 bai 11.5 MB
EGAF00004726485 bam 101.0 GB
EGAF00004726486 bai 15.5 MB
EGAF00004726487 bam 17.2 GB
EGAF00004726488 bai 9.8 MB
EGAF00004726489 bam 89.3 GB
EGAF00004726490 bai 15.2 MB
EGAF00004726491 bam 28.7 GB
EGAF00004726492 bai 11.5 MB
EGAF00004726493 bam 18.6 GB
EGAF00004726494 bai 10.1 MB
EGAF00004726495 bam 603.3 MB
EGAF00004726496 bai 1.8 MB
EGAF00004726497 bam 494.3 MB
EGAF00004726498 bai 1.7 MB
EGAF00004726499 bam 538.1 MB
EGAF00004726500 bai 1.7 MB
EGAF00004726501 bam 1.1 GB
EGAF00004726502 bai 1.9 MB
EGAF00004726503 bam 611.0 MB
EGAF00004726504 bai 1.7 MB
EGAF00004726505 bam 264.7 MB
EGAF00004726506 bai 1.7 MB
EGAF00004726507 bam 695.6 MB
EGAF00004726508 bai 1.8 MB
EGAF00004726509 bam 1.6 GB
EGAF00004726510 bai 1.9 MB
EGAF00004726511 bam 1.5 GB
EGAF00004726512 bai 1.8 MB
EGAF00004726513 bam 1.7 GB
EGAF00004726514 bai 1.8 MB
EGAF00004726515 bam 25.1 GB
EGAF00004726516 bai 10.4 MB
EGAF00004726517 bam 1.3 GB
EGAF00004726518 bai 1.7 MB
EGAF00004726519 bam 1.1 GB
EGAF00004726520 bai 1.7 MB
EGAF00004726521 bam 716.5 MB
EGAF00004726522 bai 2.0 MB
EGAF00004726523 bam 625.6 MB
EGAF00004726524 bai 1.9 MB
EGAF00004726525 bam 650.1 MB
EGAF00004726526 bai 2.0 MB
EGAF00004726527 bam 701.9 MB
EGAF00004726528 bai 1.9 MB
EGAF00004726529 bam 454.3 MB
EGAF00004726530 bai 1.8 MB
EGAF00004726531 bam 1.1 GB
EGAF00004726532 bai 5.1 MB
EGAF00004726533 bam 1.2 GB
EGAF00004726534 bai 1.8 MB
EGAF00004726535 bam 1.2 GB
EGAF00004726536 bai 2.1 MB
EGAF00004726537 bam 20.5 GB
EGAF00004726538 bai 7.7 MB
EGAF00004726539 bam 1.5 GB
EGAF00004726540 bai 2.0 MB
EGAF00004726541 bam 2.1 GB
EGAF00004726542 bai 3.4 MB
EGAF00004726543 bam 2.0 GB
EGAF00004726544 bai 2.1 MB
EGAF00004726545 bam 614.8 MB
EGAF00004726546 bai 1.7 MB
EGAF00004726547 bam 838.8 MB
EGAF00004726548 bai 1.7 MB
EGAF00004726549 bam 1.4 GB
EGAF00004726550 bai 1.9 MB
EGAF00004726551 bam 22.8 GB
EGAF00004726552 bai 10.0 MB
EGAF00004726553 bam 35.2 GB
EGAF00004726554 bai 11.6 MB
EGAF00004726555 bam 29.4 GB
EGAF00004726556 bai 10.1 MB
EGAF00004726557 bam 18.9 GB
EGAF00004726558 bai 8.7 MB
EGAF00004726559 bam 33.9 GB
EGAF00004726560 bai 13.6 MB
EGAF00004726561 bam 17.0 GB
EGAF00004726562 bai 8.2 MB
EGAF00004726563 bam 21.6 GB
EGAF00004726564 bai 7.6 MB
EGAF00004726565 bam 12.0 GB
EGAF00004726566 bai 6.6 MB
EGAF00004726567 bam 31.0 GB
EGAF00004726568 bai 12.0 MB
EGAF00004726569 bam 31.4 GB
EGAF00004726570 bai 12.3 MB
EGAF00004726571 bam 37.9 GB
EGAF00004726572 bai 12.9 MB
EGAF00004726573 bam 20.7 GB
EGAF00004726574 bai 8.9 MB
EGAF00004726575 bam 22.1 GB
EGAF00004726576 bai 7.2 MB
EGAF00004726577 bam 32.6 GB
EGAF00004726578 bai 8.6 MB
EGAF00004726579 bam 27.7 GB
EGAF00004726580 bai 10.1 MB
EGAF00004726581 bam 41.3 GB
EGAF00004726582 bai 13.5 MB
EGAF00004726583 bam 14.3 GB
EGAF00004726584 bai 8.1 MB
EGAF00004726585 bam 29.5 GB
EGAF00004726586 bai 10.8 MB
EGAF00004726587 bam 19.7 GB
EGAF00004726588 bai 9.3 MB
EGAF00004726589 bam 21.0 GB
EGAF00004726590 bai 9.0 MB
EGAF00004726591 bam 33.1 GB
EGAF00004726592 bai 11.6 MB
EGAF00004726593 bam 17.8 GB
EGAF00004726594 bai 8.7 MB
EGAF00004726595 bam 19.9 GB
EGAF00004726596 bai 9.2 MB
EGAF00004726597 bam 41.7 GB
EGAF00004726598 bai 13.7 MB
EGAF00004726599 bam 22.7 GB
EGAF00004726600 bai 7.8 MB
EGAF00004726601 bam 25.6 GB
EGAF00004726602 bai 10.3 MB
EGAF00004726603 bam 33.8 GB
EGAF00004726604 bai 9.4 MB
EGAF00004726605 bam 18.9 GB
EGAF00004726606 bai 8.1 MB
EGAF00004726607 bam 18.4 GB
EGAF00004726608 bai 6.9 MB
EGAF00004726609 bam 37.7 GB
EGAF00004726610 bai 10.9 MB
EGAF00004726611 bam 15.3 GB
EGAF00004726612 bai 9.1 MB
EGAF00004726613 bam 29.0 GB
EGAF00004726614 bai 9.8 MB
EGAF00004726615 bam 28.4 GB
EGAF00004726616 bai 7.7 MB
EGAF00004726617 bam 34.9 GB
EGAF00004726618 bai 12.5 MB
EGAF00004726619 bam 29.8 GB
EGAF00004726620 bai 10.6 MB
EGAF00004726621 bam 24.5 GB
EGAF00004726622 bai 7.6 MB
EGAF00004726623 bam 19.0 GB
EGAF00004726624 bai 7.4 MB
EGAF00004726625 bam 31.4 GB
EGAF00004726626 bai 10.7 MB
EGAF00004726627 bam 36.8 GB
EGAF00004726628 bai 9.0 MB
EGAF00004726629 bam 29.5 GB
EGAF00004726630 bai 9.0 MB
EGAF00004726631 bam 16.2 GB
EGAF00004726632 bai 7.8 MB
EGAF00004726633 bam 26.5 GB
EGAF00004726634 bai 8.3 MB
EGAF00004726635 bam 26.1 GB
EGAF00004726636 bai 8.9 MB
EGAF00004726637 bam 55.6 GB
EGAF00004726638 bai 14.6 MB
EGAF00004726639 bam 22.5 GB
EGAF00004726640 bai 7.2 MB
EGAF00004726641 bam 29.9 GB
EGAF00004726642 bai 10.6 MB
EGAF00004726643 bam 47.1 GB
EGAF00004726644 bai 14.4 MB
EGAF00004726645 bam 19.7 GB
EGAF00004726646 bai 9.1 MB
EGAF00004726647 bam 16.5 GB
EGAF00004726648 bai 8.1 MB
EGAF00004726649 bam 32.5 GB
EGAF00004726650 bai 9.6 MB
EGAF00004726651 bam 18.0 GB
EGAF00004726652 bai 8.3 MB
EGAF00004726653 bam 25.5 GB
EGAF00004726654 bai 9.0 MB
EGAF00004726655 bam 28.2 GB
EGAF00004726656 bai 11.7 MB
EGAF00004726657 bam 17.2 GB
EGAF00004726658 bai 7.8 MB
EGAF00004726659 bam 33.8 GB
EGAF00004726660 bai 9.6 MB
EGAF00004726661 bam 28.7 GB
EGAF00004726662 bai 8.9 MB
EGAF00004726663 bam 20.8 GB
EGAF00004726664 bai 7.0 MB
EGAF00004726665 bam 25.7 GB
EGAF00004726666 bai 10.8 MB
EGAF00004726667 bam 26.9 GB
EGAF00004726668 bai 11.9 MB
EGAF00004726669 bam 50.8 GB
EGAF00004726670 bai 13.4 MB
EGAF00004726671 bam 26.0 GB
EGAF00004726672 bai 8.8 MB
EGAF00004726673 bam 18.7 GB
EGAF00004726674 bai 9.1 MB
EGAF00004726675 bam 34.7 GB
EGAF00004726676 bai 13.7 MB
EGAF00004726677 bam 34.8 GB
EGAF00004726678 bai 12.8 MB
EGAF00004726679 bam 23.3 GB
EGAF00004726680 bai 9.8 MB
EGAF00004726681 bam 25.3 GB
EGAF00004726682 bai 7.6 MB
EGAF00004726683 bam 6.7 GB
EGAF00004726684 bai 6.9 MB
EGAF00004726685 bam 28.4 GB
EGAF00004726686 bai 8.3 MB
EGAF00004726687 bam 33.5 GB
EGAF00004726688 bai 9.7 MB
EGAF00004726689 bam 33.3 GB
EGAF00004726690 bai 11.8 MB
EGAF00004726691 bam 14.2 GB
EGAF00004726692 bai 6.5 MB
EGAF00004726693 bam 25.4 GB
EGAF00004726694 bai 8.5 MB
EGAF00004726695 bam 64.9 GB
EGAF00004726696 bai 13.9 MB
EGAF00004726697 bam 24.6 GB
EGAF00004726698 bai 8.1 MB
EGAF00004726699 bam 25.8 GB
EGAF00004726700 bai 9.5 MB
EGAF00004726701 bam 32.0 GB
EGAF00004726702 bai 10.5 MB
EGAF00004726703 bam 35.4 GB
EGAF00004726704 bai 9.3 MB
EGAF00004726705 bam 30.5 GB
EGAF00004726706 bai 11.2 MB
EGAF00004726707 bam 27.4 GB
EGAF00004726708 bai 9.2 MB
EGAF00004726709 bam 39.0 GB
EGAF00004726710 bai 10.0 MB
EGAF00004726711 bam 33.5 GB
EGAF00004726712 bai 10.5 MB
EGAF00004726713 bam 30.6 GB
EGAF00004726714 bai 10.0 MB
EGAF00004726715 bam 27.8 GB
EGAF00004726716 bai 8.1 MB
EGAF00004726717 bam 43.6 GB
EGAF00004726718 bai 12.1 MB
EGAF00004726719 bam 29.2 GB
EGAF00004726720 bai 10.5 MB
EGAF00004726721 bam 35.9 GB
EGAF00004726722 bai 10.6 MB
EGAF00004726723 bam 850.1 MB
EGAF00004726724 bai 1.8 MB
EGAF00004726725 bam 453.8 MB
EGAF00004726726 bai 1.7 MB
EGAF00004726727 bam 333.4 MB
EGAF00004726728 bai 1.6 MB
EGAF00004726729 bam 451.0 MB
EGAF00004726730 bai 1.7 MB
EGAF00004726731 bam 373.0 MB
EGAF00004726732 bai 1.7 MB
EGAF00004726733 bam 394.5 MB
EGAF00004726734 bai 1.7 MB
EGAF00004726735 bam 18.4 GB
EGAF00004726736 bai 9.4 MB
606 Files (8.8 TB)