Overview
overview
10Static
static
5My-Skidded...f2.exe
windows10-2004-x64
My-Skidded...Us.vbs
windows10-2004-x64
1My-Skidded...AT.exe
windows10-2004-x64
10My-Skidded...UN.exe
windows10-2004-x64
10My-Skidded...no.exe
windows10-2004-x64
6My-Skidded...MK.exe
windows10-2004-x64
My-Skidded...ck.vbs
windows10-2004-x64
1My-Skidded...it.exe
windows10-2004-x64
7My-Skidded... 2.bat
windows10-2004-x64
7My-Skidded...OR.vbs
windows10-2004-x64
1My-Skidded...ge.exe
windows10-2004-x64
My-Skidded...ck.exe
windows10-2004-x64
10My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...ba.vbs
windows10-2004-x64
1My-Skidded...ad.exe
windows10-2004-x64
My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...AL.exe
windows10-2004-x64
6My-Skidded...en.exe
windows10-2004-x64
6My-Skidded...in.exe
windows10-2004-x64
6My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
10My-Skidded...24.exe
windows10-2004-x64
10My-Skidded....0.bat
windows10-2004-x64
7My-Skidded...as.exe
windows10-2004-x64
My-Skidded...ll.bat
windows10-2004-x64
My-Skidded...ks.exe
windows10-2004-x64
My-Skidded...ua.exe
windows10-2004-x64
My-Skidded...kz.bat
windows10-2004-x64
8My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...UG.exe
windows10-2004-x64
My-Skidded...mi.exe
windows10-2004-x64
6Resubmissions
09/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
67s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 01:58
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
My-Skidded-malwares-main/AmongUs.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
My-Skidded-malwares-main/AnaRAT.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
My-Skidded-malwares-main/CRINGE-DO-NOT-RUN.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
My-Skidded-malwares-main/Cirno.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
My-Skidded-malwares-main/DAMK.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
My-Skidded-malwares-main/Dell_Fuck.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
My-Skidded-malwares-main/Discord Expliot Kit.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
My-Skidded-malwares-main/ERROR 2.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
My-Skidded-malwares-main/ERROR.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
My-Skidded-malwares-main/Fello_s_Revenge.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
My-Skidded-malwares-main/Fellos RAT-Pack.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
My-Skidded-malwares-main/KonataMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral14
Sample
My-Skidded-malwares-main/KonoSuba.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
My-Skidded-malwares-main/MarisaFumoDownload.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
My-Skidded-malwares-main/MarisaMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
My-Skidded-malwares-main/Marlon2210FACEREVEAL.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
My-Skidded-malwares-main/Marlon2210KeyGen.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
My-Skidded-malwares-main/Megumin.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
My-Skidded-malwares-main/NazrinMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
My-Skidded-malwares-main/PCCooker2.0_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
My-Skidded-malwares-main/PCCooker_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
My-Skidded-malwares-main/PanKoza2.0 Discord Token Stealer 2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
My-Skidded-malwares-main/RaM KilLEr 1.0.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
My-Skidded-malwares-main/Rias.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral26
Sample
My-Skidded-malwares-main/Run All.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
My-Skidded-malwares-main/TouhouHacks.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral28
Sample
My-Skidded-malwares-main/Trojan.Aqua.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral30
Sample
My-Skidded-malwares-main/UtsuhoMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
My-Skidded-malwares-main/VXUG.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral32
Sample
My-Skidded-malwares-main/YuukaKazami.exe
Resource
win10v2004-20250217-en
Errors
General
-
Target
My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
-
Size
8.6MB
-
MD5
57c4e3c3fe4cad4179e3d2203aec90b6
-
SHA1
12c1262f5aadb9cb11d266681841ffdebf85fe17
-
SHA256
6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2
-
SHA512
7e9cb1752924945212198100141cab9ed65b702535ebbbf587a1d0decc736a79e50849ba621c2f21505a8a855bb122277093768dab005194b3972b943b557499
-
SSDEEP
49152:FBtiVC1wE+5WhANOgkImhsSWUlqiFEJ3QqkfqV8+PYfjKp9uMuqtwtpi4gmmZRwx:Fd
Malware Config
Signatures
-
Disables RegEdit via registry modification 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Curium.exe Set value (int) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Berkelium.exe Set value (int) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Fermium.exe Set value (int) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Einsteinium.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe -
Executes dropped EXE 11 IoCs
pid Process 2880 Bahhhh.exe 3860 Berkelium.exe 1768 Boron.exe 3420 Californium.exe 4088 CatDaMBR.exe 4856 Cobalt.exe 1920 Curium.exe 2936 Einsteinium.exe 2132 EternalOrange.exe 2416 Fermium.exe 5492 Flerovium.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CustomMBR = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CatDaMBR.exe -BypassWarning" CatDaMBR.exe -
pid Process 3492 GameBarPresenceWriter.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 8 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Einsteinium.exe File opened for modification \??\PhysicalDrive0 Flerovium.exe File opened for modification \??\PhysicalDrive0 Curium.exe File opened for modification \??\PhysicalDrive0 Boron.exe File opened for modification \??\PhysicalDrive0 Cobalt.exe File opened for modification \??\PhysicalDrive0 Berkelium.exe File opened for modification \??\PhysicalDrive0 CatDaMBR.exe File opened for modification \??\PhysicalDrive0 Fermium.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5624 3228 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fermium.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Curium.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Berkelium.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Californium.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flerovium.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bahhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cobalt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CatDaMBR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EternalOrange.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boron.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Einsteinium.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Kills process with taskkill 3 IoCs
pid Process 1656 taskkill.exe 3812 taskkill.exe 2572 taskkill.exe -
Modifies data under HKEY_USERS 51 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "212" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1294999112-580688058-1763548717-1000\{851FA38C-DC9E-43C7-82CA-056FC643E217} svchost.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 5172 reg.exe 1464 reg.exe 2200 reg.exe 4472 reg.exe 1924 reg.exe 464 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2052 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1768 Boron.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeCreateGlobalPrivilege 3924 dwm.exe Token: SeChangeNotifyPrivilege 3924 dwm.exe Token: 33 3924 dwm.exe Token: SeIncBasePriorityPrivilege 3924 dwm.exe Token: SeCreateGlobalPrivilege 1532 dwm.exe Token: SeChangeNotifyPrivilege 1532 dwm.exe Token: 33 1532 dwm.exe Token: SeIncBasePriorityPrivilege 1532 dwm.exe Token: SeShutdownPrivilege 4088 CatDaMBR.exe Token: SeDebugPrivilege 2416 Fermium.exe Token: SeDebugPrivilege 2936 Einsteinium.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: 33 3688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3688 AUDIODG.EXE Token: SeDebugPrivilege 1920 Curium.exe Token: SeDebugPrivilege 3812 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 3860 Berkelium.exe Token: SeShutdownPrivilege 1532 dwm.exe Token: SeCreatePagefilePrivilege 1532 dwm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4088 CatDaMBR.exe 5304 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2880 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 86 PID 3228 wrote to memory of 2880 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 86 PID 3228 wrote to memory of 2880 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 86 PID 3228 wrote to memory of 3860 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 87 PID 3228 wrote to memory of 3860 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 87 PID 3228 wrote to memory of 3860 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 87 PID 3228 wrote to memory of 1768 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 88 PID 3228 wrote to memory of 1768 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 88 PID 3228 wrote to memory of 1768 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 88 PID 3228 wrote to memory of 3420 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 89 PID 3228 wrote to memory of 3420 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 89 PID 3228 wrote to memory of 3420 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 89 PID 3228 wrote to memory of 4088 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 90 PID 3228 wrote to memory of 4088 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 90 PID 3228 wrote to memory of 4088 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 90 PID 3228 wrote to memory of 4856 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 91 PID 3228 wrote to memory of 4856 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 91 PID 3228 wrote to memory of 4856 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 91 PID 3228 wrote to memory of 1920 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 92 PID 3228 wrote to memory of 1920 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 92 PID 3228 wrote to memory of 1920 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 92 PID 3228 wrote to memory of 5676 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 93 PID 3228 wrote to memory of 5676 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 93 PID 3228 wrote to memory of 5676 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 93 PID 3228 wrote to memory of 2936 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 94 PID 3228 wrote to memory of 2936 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 94 PID 3228 wrote to memory of 2936 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 94 PID 3228 wrote to memory of 2132 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 96 PID 3228 wrote to memory of 2132 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 96 PID 3228 wrote to memory of 2132 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 96 PID 3228 wrote to memory of 2416 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 97 PID 3228 wrote to memory of 2416 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 97 PID 3228 wrote to memory of 2416 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 97 PID 3228 wrote to memory of 5492 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 99 PID 3228 wrote to memory of 5492 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 99 PID 3228 wrote to memory of 5492 3228 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 99 PID 4088 wrote to memory of 2052 4088 CatDaMBR.exe 110 PID 4088 wrote to memory of 2052 4088 CatDaMBR.exe 110 PID 4088 wrote to memory of 2052 4088 CatDaMBR.exe 110 PID 5492 wrote to memory of 3188 5492 Flerovium.exe 114 PID 5492 wrote to memory of 3188 5492 Flerovium.exe 114 PID 5492 wrote to memory of 3188 5492 Flerovium.exe 114 PID 3188 wrote to memory of 1656 3188 cmd.exe 117 PID 3188 wrote to memory of 1656 3188 cmd.exe 117 PID 3188 wrote to memory of 1656 3188 cmd.exe 117 PID 5492 wrote to memory of 5972 5492 Flerovium.exe 119 PID 5492 wrote to memory of 5972 5492 Flerovium.exe 119 PID 5492 wrote to memory of 5972 5492 Flerovium.exe 119 PID 5972 wrote to memory of 2200 5972 cmd.exe 121 PID 5972 wrote to memory of 2200 5972 cmd.exe 121 PID 5972 wrote to memory of 2200 5972 cmd.exe 121 PID 5492 wrote to memory of 5092 5492 Flerovium.exe 122 PID 5492 wrote to memory of 5092 5492 Flerovium.exe 122 PID 5492 wrote to memory of 5092 5492 Flerovium.exe 122 PID 5092 wrote to memory of 4472 5092 cmd.exe 124 PID 5092 wrote to memory of 4472 5092 cmd.exe 124 PID 5092 wrote to memory of 4472 5092 cmd.exe 124 PID 4856 wrote to memory of 3512 4856 Cobalt.exe 126 PID 4856 wrote to memory of 3512 4856 Cobalt.exe 126 PID 4856 wrote to memory of 3512 4856 Cobalt.exe 126 PID 1768 wrote to memory of 2924 1768 Boron.exe 127 PID 1768 wrote to memory of 2924 1768 Boron.exe 127 PID 1768 wrote to memory of 2924 1768 Boron.exe 127 PID 2924 wrote to memory of 3812 2924 cmd.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe"C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Bahhhh.exe"C:\Users\Admin\AppData\Local\Temp\Bahhhh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\Berkelium.exe"C:\Users\Admin\AppData\Local\Temp\Berkelium.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\Boron.exe"C:\Users\Admin\AppData\Local\Temp\Boron.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG DELETE HKCU /f3⤵
- System Location Discovery: System Language Discovery
PID:6068 -
C:\Windows\SysWOW64\reg.exeREG DELETE HKCU /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Californium.exe"C:\Users\Admin\AppData\Local\Temp\Californium.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\CatDaMBR.exe"C:\Users\Admin\AppData\Local\Temp\CatDaMBR.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN CustomMBR /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\CatDaMBR.exe -BypassWarning"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Cobalt.exe"C:\Users\Admin\AppData\Local\Temp\Cobalt.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG DELETE HKCU /f3⤵
- System Location Discovery: System Language Discovery
PID:4116 -
C:\Windows\SysWOW64\reg.exeREG DELETE HKCU /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:576 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Curium.exe"C:\Users\Admin\AppData\Local\Temp\Curium.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eee.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\Einsteinium.exe"C:\Users\Admin\AppData\Local\Temp\Einsteinium.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\EternalOrange.exe"C:\Users\Admin\AppData\Local\Temp\EternalOrange.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\Fermium.exe"C:\Users\Admin\AppData\Local\Temp\Fermium.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\Flerovium.exe"C:\Users\Admin\AppData\Local\Temp\Flerovium.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG DELETE HKCU /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5972 -
C:\Windows\SysWOW64\reg.exeREG DELETE HKCU /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 18322⤵
- Program crash
PID:5624
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:3492
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:2780
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3228 -ip 32281⤵PID:3864
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3951855 /state1:0x41c64e6d1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:4932
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x474 0x4a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3917055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD527095b6e72d783c7ad7114f91b87e640
SHA115ef79e042f4befb60783b1d7931bfd916972096
SHA2560738c33d4cbdef4bd1c216248a0a7a20ee7254e63d526fc113e827938aff2520
SHA5129852bc26220c0ca60921425f7a089c4b5356624be41cf1d0e5b04eb36f47b840e2e1235d115927a6d3d69c6f3e60dfef484c67c59ade9edbf4e407b2c02c02ce
-
Filesize
74KB
MD5c9f5fcf8b057f6f5b0f562fe1181cb18
SHA1a1a4b505e2fc4d92ebacbdc6c783a29f7553bc41
SHA256ad024d92fa10cba15bc1930f6d6792eba33feead5b4b8c4b4881c34409c31e3d
SHA512a3fbbe86632fccdc74c43bc7c0afcb7c33463540f21473099a2176edff870bd47eac98d2dc64f684939a60888db190a4e091cc7d3068ca436da8e62969b17e58
-
Filesize
207KB
MD530f2f3ba2f5053f75fd1af6186db6f7f
SHA1ac9f70dcdf0a4caf57ac8b300b2205090f0850d7
SHA256d350d7c68aa5b939d08fba384d1fbe44b757fcdadecb6534b5239d46bfef1f75
SHA5125c39807596324fd7ba12c326af2e9f9b8666e76980ad1189fc49b71736eae779e461e5da71f9a27e014be8a8bd978dac6e7b3b3ceddbadb85f95682cc46cf7d8
-
Filesize
223KB
MD5306a2acc6e08033fad9b193dcbd4de05
SHA1bccff10f633cac6c0bbda5a54061dd05d8f980de
SHA256512a4972b15235864fc896484128b79d48d0dff076d6356559a0b75cb67067d3
SHA5129d5e2abbd480181156624804d0709b403297261062bb3d3b2bd08f3a3905909109dfbd442268f94f2269ee3b8bf7a3a1f4206c65e2bd291602586f44fd084fbc
-
Filesize
683KB
MD55cdd80274f50bbd149441b4563416341
SHA10436f39868fde8334f7f8398345fa97263a1f38e
SHA2566d842aa210cfd67b6b217b7d5abb88b513e235d3a763ac9eb80733f8bbfd5814
SHA512b6f1e546de2ac25b7fd48763bf19556d1c83f63e68a0886a3dbb9977886693688d35da6f13ee947c661aef67930af1223f898cdf3bf2fe79d989966568c95331
-
Filesize
193KB
MD562f60979fd6a1b5ac711801d575164bd
SHA108374033a9219287c568774c90e11e74d6862f43
SHA256a165dade3174a456d5af6835359d090cfbde706b941c46177656e06e869409a0
SHA512f855c40c0649d10ede6857f0fee888c724f480bdcbba24c60b5bbb0a86a3ab9fdd1872813ff574993a4d50cdafd7259b29499b4791ec11c6b635157e2b718e8b
-
Filesize
45KB
MD509e2aac9365ada595f8421858745bb27
SHA15a06e5e910c5bff7dcc598207f8c38e998c34a1f
SHA25695497d5ed96e5b3458e1729e6c5015cfab6c5bc44907f2324ac7c6bd014a9ba2
SHA5127294b109b0e0934a1f2f3648b65c55c319027b154f3866e64fbf5480aff352e5424e511d9f68af29bdbccb897ad8e874b55f42be1d745dc56fd5d360c36005e7
-
Filesize
59KB
MD50b18325551f9d0055a9e3aa7921dfc76
SHA13b5076541b73bb6f9b1910dcc339709e360a9a92
SHA256350f39bf3a98520e20f6aed34b4786ee2f6518c979613653b08dcf07f3b5e15e
SHA512b45440ca9863bbb1cf2e1434612b32ed2f4f8d54645a02e4c7dc84297fae2222a40cb18e6e29f0eba5e475846ff02fa60ce35107c63a6f0a07830d89647a285b
-
Filesize
272KB
MD559b1f2c4da85066cc5a73d80cfb9dcd2
SHA1bf005c3de251295d74ec19bf90d03ddcf06b1d88
SHA2569242ae324864a6388d09a076110b3d55cb97056e22b201c4cc8cbcae29f302cf
SHA512951bd4db81e9f0bdbc6a16c9ce3f400f287e9815e097e0a984d407dc8df85fbde150930a18af474f86221a4a8f46413f8c08cf2df0bbd1ad47bb85b0583595fd
-
Filesize
55KB
MD521f63fa6e6db4240fde9121fb4847a7f
SHA1a4c4ac1234960c7c3dbe0bd3133ec5c56deb3dec
SHA2564bab7485b91ec5196a586a75ac7ee7d7cb8d7cdac96f59b8d5a53a1abe09910b
SHA512cbba2dd355b6472284d0a50a2887f5de4b7c5c109eb3ff2f1b79fd6709b66c63ae0bd8146e9b1fcd97cf699144b8340b9a0ee4714aa9b15d248e63d1d4e2b9fb
-
Filesize
192KB
MD5f728c4f178a7bc544136018d674f89a1
SHA114d60483112dbff186fe9c8b5f3efd644b7855e5
SHA256bf3b53c82583803c36e00c1658cc7ea5154fa7015cc2cefd7d37bdc05a1824ac
SHA5124544c1aaa98530cd815c76d0d3a25ca6c8e74c7153260b49dd5c0050bd2df7a5bda25219766e2fa8912293758039c54afddf0dfd99f5d8af4e50bf0445a7e8da
-
Filesize
64KB
MD5e8bf30b1b6173a24fe3c091f5e41e51e
SHA12bfb376d9931b551ea2aef92e516fa4247e36c2a
SHA256e8f9473c5910d908bbcf8b3100fd1927fa4293a99b4684e29f213f44cc61a58d
SHA512050c3779a393a78a712f66fb23fd3305ad992a81983e2c91c29a6799423520c876344936ed5ab0e027c237ab1921243e67cae4e83c425828807f9fd59289d7d5