Resubmissions
12/03/2025, 21:28
250312-1bn3yatwgv 1012/03/2025, 21:24
250312-z9fzjsvpx2 1012/03/2025, 21:22
250312-z8by7stvf1 612/03/2025, 21:20
250312-z63n5stvb1 711/03/2025, 00:00
250311-aaawtasr13 510/03/2025, 21:57
250310-1t6eyazlx6 1009/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
38s -
max time network
59s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/03/2025, 21:28
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main.zip
Resource
win11-20250217-en
Errors
General
-
Target
My-Skidded-malwares-main.zip
-
Size
106.4MB
-
MD5
d01f58a973cfceca5abbb124f8e580ff
-
SHA1
b60fd4d18c92322819300af17bc44e798d0ddef4
-
SHA256
d5395f121277d2b38f4173c7df0a20a3de99edfcfe2aa697080cc81170eb76ab
-
SHA512
81d6c94f56d53cd7fa29f5c1d9f8077a176b07b9a2c859b8525f6451660fb906dd960b71358ff870019990f541e816489c131a96b1fb2b7c66178a04ed35904d
-
SSDEEP
3145728:Sg2PlA+mrMHCwbc/bAjXC0P5JCe94RWQRVBCXD7:SJlmxTAj7PtGR9RVBE3
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" CRINGE-DO-NOT-RUN.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CRINGE-DO-NOT-RUN.exe -
Windows security bypass 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" CRINGE-DO-NOT-RUN.exe -
Executes dropped EXE 25 IoCs
pid Process 1840 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe 3624 AnaRAT.exe 4632 chat_im_cooked.exe 1328 Cirno.exe 3400 CRINGE-DO-NOT-RUN.exe 3352 DAMK.exe 2452 Discord Expliot Kit.exe 1288 driverupdate_report_windows_10_22h2.txt.exe 3680 Fellos RAT-Pack.exe 4284 Fello_s_Revenge.exe 1148 gado.exe 2140 KonataMBR.exe 2016 llrainbowalexll.exe 3976 MarisaFumoDownload.exe 4288 Marlon2210FACEREVEAL.exe 1496 MarisaMBR.exe 328 Megumin.exe 3752 Marlon2210KeyGen.exe 2464 NazrinMBR.exe 1552 PanKoza2.0 Discord Token Stealer 2024.exe 2652 PCCooker2.0_x64.exe 424 Rias.exe 3360 Trojan.Aqua.exe 5088 PCCooker_x64.exe 608 TouhouHacks.exe -
Windows security modification 2 TTPs 13 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" CRINGE-DO-NOT-RUN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" CRINGE-DO-NOT-RUN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\Desktop\\My-Skidded-malwares-main\\gado.exe" gado.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CRINGE-DO-NOT-RUN.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 gado.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2452-302-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe -
resource yara_rule behavioral1/files/0x001900000002ae69-106.dat upx behavioral1/memory/3400-141-0x00000000022F0000-0x000000000337E000-memory.dmp upx behavioral1/memory/2452-302-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/files/0x001a00000002aea0-377.dat upx behavioral1/memory/5860-378-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral1/memory/5860-380-0x0000000000400000-0x0000000000523000-memory.dmp upx behavioral1/memory/3400-160-0x00000000022F0000-0x000000000337E000-memory.dmp upx behavioral1/memory/3400-117-0x00000000022F0000-0x000000000337E000-memory.dmp upx behavioral1/memory/2452-109-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI CRINGE-DO-NOT-RUN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PanKoza2.0 Discord Token Stealer 2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language driverupdate_report_windows_10_22h2.txt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCCooker2.0_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rias.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCCooker_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TouhouHacks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fello_s_Revenge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KonataMBR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Aqua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chat_im_cooked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DAMK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnaRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CRINGE-DO-NOT-RUN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrainbowalexll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MarisaFumoDownload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Megumin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Marlon2210FACEREVEAL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cirno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fellos RAT-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord Expliot Kit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gado.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Marlon2210KeyGen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MarisaMBR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NazrinMBR.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "80" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4948 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3400 CRINGE-DO-NOT-RUN.exe 3400 CRINGE-DO-NOT-RUN.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 832 7zG.exe Token: 35 832 7zG.exe Token: SeSecurityPrivilege 832 7zG.exe Token: SeSecurityPrivilege 832 7zG.exe Token: SeShutdownPrivilege 1148 gado.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe Token: SeDebugPrivilege 3400 CRINGE-DO-NOT-RUN.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 832 7zG.exe 3400 CRINGE-DO-NOT-RUN.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2016 llrainbowalexll.exe 3976 MarisaFumoDownload.exe 2140 KonataMBR.exe 3752 Marlon2210KeyGen.exe 4632 chat_im_cooked.exe 3352 DAMK.exe 1496 MarisaMBR.exe 4288 Marlon2210FACEREVEAL.exe 328 Megumin.exe 1328 Cirno.exe 2464 NazrinMBR.exe 4776 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 416 wrote to memory of 1840 416 cmd.exe 89 PID 416 wrote to memory of 1840 416 cmd.exe 89 PID 416 wrote to memory of 1840 416 cmd.exe 89 PID 416 wrote to memory of 3624 416 cmd.exe 90 PID 416 wrote to memory of 3624 416 cmd.exe 90 PID 416 wrote to memory of 3624 416 cmd.exe 90 PID 416 wrote to memory of 4632 416 cmd.exe 91 PID 416 wrote to memory of 4632 416 cmd.exe 91 PID 416 wrote to memory of 4632 416 cmd.exe 91 PID 416 wrote to memory of 1328 416 cmd.exe 92 PID 416 wrote to memory of 1328 416 cmd.exe 92 PID 416 wrote to memory of 1328 416 cmd.exe 92 PID 416 wrote to memory of 3400 416 cmd.exe 93 PID 416 wrote to memory of 3400 416 cmd.exe 93 PID 416 wrote to memory of 3400 416 cmd.exe 93 PID 416 wrote to memory of 3352 416 cmd.exe 94 PID 416 wrote to memory of 3352 416 cmd.exe 94 PID 416 wrote to memory of 3352 416 cmd.exe 94 PID 416 wrote to memory of 2452 416 cmd.exe 95 PID 416 wrote to memory of 2452 416 cmd.exe 95 PID 416 wrote to memory of 2452 416 cmd.exe 95 PID 416 wrote to memory of 1288 416 cmd.exe 96 PID 416 wrote to memory of 1288 416 cmd.exe 96 PID 416 wrote to memory of 1288 416 cmd.exe 96 PID 416 wrote to memory of 3680 416 cmd.exe 97 PID 416 wrote to memory of 3680 416 cmd.exe 97 PID 416 wrote to memory of 3680 416 cmd.exe 97 PID 416 wrote to memory of 4284 416 cmd.exe 98 PID 416 wrote to memory of 4284 416 cmd.exe 98 PID 416 wrote to memory of 4284 416 cmd.exe 98 PID 416 wrote to memory of 1148 416 cmd.exe 99 PID 416 wrote to memory of 1148 416 cmd.exe 99 PID 416 wrote to memory of 1148 416 cmd.exe 99 PID 416 wrote to memory of 2140 416 cmd.exe 100 PID 416 wrote to memory of 2140 416 cmd.exe 100 PID 416 wrote to memory of 2140 416 cmd.exe 100 PID 416 wrote to memory of 2016 416 cmd.exe 101 PID 416 wrote to memory of 2016 416 cmd.exe 101 PID 416 wrote to memory of 2016 416 cmd.exe 101 PID 416 wrote to memory of 3976 416 cmd.exe 102 PID 416 wrote to memory of 3976 416 cmd.exe 102 PID 416 wrote to memory of 3976 416 cmd.exe 102 PID 416 wrote to memory of 1496 416 cmd.exe 103 PID 416 wrote to memory of 1496 416 cmd.exe 103 PID 416 wrote to memory of 1496 416 cmd.exe 103 PID 416 wrote to memory of 4288 416 cmd.exe 104 PID 416 wrote to memory of 4288 416 cmd.exe 104 PID 416 wrote to memory of 4288 416 cmd.exe 104 PID 1148 wrote to memory of 4948 1148 gado.exe 105 PID 1148 wrote to memory of 4948 1148 gado.exe 105 PID 1148 wrote to memory of 4948 1148 gado.exe 105 PID 416 wrote to memory of 3752 416 cmd.exe 106 PID 416 wrote to memory of 3752 416 cmd.exe 106 PID 416 wrote to memory of 3752 416 cmd.exe 106 PID 416 wrote to memory of 328 416 cmd.exe 107 PID 416 wrote to memory of 328 416 cmd.exe 107 PID 416 wrote to memory of 328 416 cmd.exe 107 PID 416 wrote to memory of 2464 416 cmd.exe 109 PID 416 wrote to memory of 2464 416 cmd.exe 109 PID 416 wrote to memory of 2464 416 cmd.exe 109 PID 416 wrote to memory of 1552 416 cmd.exe 110 PID 416 wrote to memory of 1552 416 cmd.exe 110 PID 416 wrote to memory of 1552 416 cmd.exe 110 PID 416 wrote to memory of 2652 416 cmd.exe 111 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CRINGE-DO-NOT-RUN.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:816
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:824
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:476
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2696
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3312
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main.zip2⤵PID:1484
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap24869:106:7zEvent137362⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:832
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\My-Skidded-malwares-main\Run All.bat2⤵PID:3044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\My-Skidded-malwares-main\Run All.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4884
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\AnaRAT.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\AnaRAT.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\chat_im_cooked.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\chat_im_cooked.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4632
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Cirno.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Cirno.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\CRINGE-DO-NOT-RUN.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\CRINGE-DO-NOT-RUN.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- System policy modification
PID:3400
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\DAMK.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\DAMK.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3352
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Discord Expliot Kit.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Discord Expliot Kit.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\driverupdate_report_windows_10_22h2.txt.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\driverupdate_report_windows_10_22h2.txt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1288
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Fellos RAT-Pack.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Fellos RAT-Pack.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Fello_s_Revenge.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Fello_s_Revenge.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\gado.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\gado.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\Desktop\My-Skidded-malwares-main\gado.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4948 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4672
-
-
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\KonataMBR.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\KonataMBR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\llrainbowalexll.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\llrainbowalexll.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\MarisaFumoDownload.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\MarisaFumoDownload.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3976
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\MarisaMBR.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\MarisaMBR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Marlon2210FACEREVEAL.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Marlon2210FACEREVEAL.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Marlon2210KeyGen.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Marlon2210KeyGen.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3752
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Megumin.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Megumin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:328
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\NazrinMBR.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\NazrinMBR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\PanKoza2.0 Discord Token Stealer 2024.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\PanKoza2.0 Discord Token Stealer 2024.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\PCCooker2.0_x64.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\PCCooker2.0_x64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\VirusShare_0bd61f046f4d99491fa3588dba294e04.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_0bd61f046f4d99491fa3588dba294e04.exe"4⤵PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\クラック.exe"C:\Users\Admin\AppData\Local\Temp\クラック.exe"4⤵PID:5928
-
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\PCCooker_x64.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\PCCooker_x64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Rias.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Rias.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:424
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\TouhouHacks.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\TouhouHacks.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:608
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\Trojan.Aqua.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\Trojan.Aqua.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\UtsuhoMBR.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\UtsuhoMBR.exe"3⤵PID:4020
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\VXUG.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\VXUG.exe"3⤵PID:3768
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\YuukaKazami.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\YuukaKazami.exe"3⤵PID:3744
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\YuukaMBR.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\YuukaMBR.exe"3⤵PID:1536
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\❾➈➒.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\❾➈➒.exe"3⤵PID:5268
-
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\クラック.exe"C:\Users\Admin\Desktop\My-Skidded-malwares-main\クラック.exe"3⤵PID:5284
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3440
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:3736
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3756
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3940
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4220
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3152
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a18055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4776
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD50bd61f046f4d99491fa3588dba294e04
SHA1e11aa40742e7842130922a483e12377b162e6e74
SHA256ef9e871b1df21e26aaee91de42a9939766db3db6543f6b7e151e8b6e37124723
SHA512c074f42f29abb6987520f6c661ccff1e6bbf3389a23c4416fa4489cf144947ceb3e0962a5c510d99edd42ee070cb9bf262350afa56fbd2bee5deae591c255c5b
-
C:\Users\Admin\Desktop\My-Skidded-malwares-main\6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
Filesize8.6MB
MD557c4e3c3fe4cad4179e3d2203aec90b6
SHA112c1262f5aadb9cb11d266681841ffdebf85fe17
SHA2566abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2
SHA5127e9cb1752924945212198100141cab9ed65b702535ebbbf587a1d0decc736a79e50849ba621c2f21505a8a855bb122277093768dab005194b3972b943b557499
-
Filesize
6.0MB
MD5b300d99faf11ac3c6d3609c34f39ad5b
SHA1039310584b1e8fb43a08a865f3ab1b64610c8013
SHA256b8af724789e01cb47a661d40a22a5ec93a2f1499d0ace4cd5e1d7d9fffa89246
SHA5122158ca82f753258c4abee3bf425f91bd26a79fcf7c53cbb98fd5980a53d678613258367a5f10117547f3d900456d78a0e4a7c85b0f1806948e8e5b767ccb26d0
-
Filesize
1.4MB
MD5ccb5b4eb6761383280df907ff6a51483
SHA1320cd5a840ad1c407a1a4178b0fb6d9b3bb4b57f
SHA256e58e7d353aacfc1beb849048c31e88fb8c528f9c42e0bb4afe487ff6d03bb245
SHA512c2a92c9bd369615017d58e222f1a9eb79ba7ae9db12d38874929cc4b7eef15469e5a090be135d2d4d8c41ba43bc8b17b52fd5dc733074ad75fb71c7fc5ddfcc2
-
Filesize
829KB
MD506f1165fd374b39e2a7102baa33b5197
SHA156415c2892de1a928fbbfbcdd533121b108e1f50
SHA2561396f43eb7dfce2024c4a0b5c91a80c1d94a98e52eb7c6f2f533f44e9acc6b70
SHA512455434788dff51a6b9fc9bf0040740680ea42870d11c83d1ed8b74bc1d2bc7aa2009276f79d8a841a3544f6c0c38954ef026fca7041abaf39d62eaf54e4bdfc8
-
Filesize
776KB
MD5e3f963c1c96b3069a768002382ce8bde
SHA18dc40c52456631b2daf4bd881c7e6320aa9f6503
SHA2565f577b7efb40a0acadc7499fdd12b581ac19aad7b5c6e404e2f40b2b3f191bb4
SHA51249a8800de23596bbff4eb52e74eee917976848d1bf5137baa699611ba9bdf69191cb2ebc587acd61cf0b72bcfc649609b56c13a0795a61e546b336667e9c24c8
-
Filesize
402KB
MD58c03f9981a98007dcf7d68415680d1a0
SHA14f4986dda199a8874b023e163de023dec27104ac
SHA256816a4880a3b1076f4e27e5f26324035c0b1ab66c2a87b28a64f8ce03429d7f5e
SHA512b4d4eda5bb1783324f5baaf458d3d7483076db1e765dc8e65c01a2b018d7e1658907fe21adf8f5e1653360ebada03c5c9503746ff716c21a20b20d793fc35079
-
Filesize
18.4MB
MD5f8e1d9b436b1d95231ae33b44c6f165c
SHA1bd4a588b9bbcd346fd0e4818da382ca241104d17
SHA25623a6dc4cce379f0d6a85e0b2b09e66d0d0f370e9d610a84aa1810aab605a3976
SHA512963f3ca6370d36d54d9034000e33198e9cfa8d54f7c70cf67e0e9be246a30bbd2db5f927c9dbb5edfebab3e255ece6023d3a2ed72715d1842519a9d2ff45a7f6
-
Filesize
6.5MB
MD558fe672cdb9c2f380f4ab2157a57cfa9
SHA1de2869332551a4f97a1ae65000adf1edf91f0121
SHA256cf7d328ce0b9c53b4613030296421f1cc710aa391bca418b3e3566db1128cbe5
SHA51260898c5480ff869d6402901a265dd1028c170201b051db7bf485eef6a8eef2683be909ee1092c29056fd6fcac05f02f2fd6997b51a94c876fd332a7ffa8fa7cd
-
Filesize
788KB
MD592354a4cf04fcebdd16f2465158562fb
SHA1c9f51999fdd20f254312f3d9cdb6186235662fc3
SHA25667ccdbe6425aefa7dc15347ebc4b233da90c2edf533c96d9811f50c3669393e4
SHA51263b860b8e5deee962d00bb2aff82fa6c128c6a5c14e57dcef45d7084473f9aa4aa3fd90403ac41041ab9adf520dd64c5cababe31a3ba26b6e712335e3a199766
-
Filesize
825KB
MD5e3558be7928053af8b9ccc60a57a40fc
SHA1253f2b018c5aaa38cd038256af9b72bd397aece1
SHA256125263fbc1a517f7302ee91bfaa548767719243b4f9dcaad33c13974fe9f4591
SHA5123152ef4c7a544f282cf4ac356adf1d4ad753a0eb3ad12bf7af66174acae700e5a8d40302305b7acddc867e834829cf430efefe7a070fd17751e7571e5d5099be
-
Filesize
585KB
MD56c21116078b7a90e7cf1492805a548dc
SHA117c7bc8d17b42b258557e23ae7b0b68ba732c5a0
SHA25688b3be30c450d7cf75bbbae7c5367bb230b8c343b8d8fe02eddf9f96c82f2496
SHA512b6e756f480f219e636ee5d55a78c5e1ccd847ce9fa8a73f5e0209ecc4bfe8b8e4f129c1ac413f49990d7bce18817ea60aedd6fde9be430d7a34795baaeee8447
-
Filesize
949KB
MD51c56b9afef7d10fd1f4770537edc69f0
SHA15babf7a11f145efa9aa70513e6c19dffc0159a88
SHA256166334e461c59caa5b53983c01438e3ecc7158608d718ade859c943f0b5c0114
SHA512298f94da49b72b2d6bc25f5a3b24bf911a7c0da112365aa6d4684cd77e614ebcb487a88d6dba1c3834265f9c2be6f1efa3fd88c5ad0628bf159772e9710539fb
-
Filesize
949KB
MD52ea42ce76ee468ccb44de2c5aeda2c4f
SHA1d3a207b088eee1c9630f51d5d6b9ab9b9dd2d0e9
SHA25613af6af4a44368987fd47e93b12603cf9e8e569975f628de513176add985b5b6
SHA51253a2c333b60dd89c3ce8574ad1ff7fad4e3eb6bbbdb7ee7d08fb6f5a6ab5beb2eb6a1e90121f662b6609582bd1f1d6fdd096d0b373d057831d50929b6976160e
-
Filesize
585KB
MD542290305664ed813bfa8ca2e19e95c0c
SHA1d995102a7f80134526c915dd59351628c91fc2f4
SHA256659d0b6efbf8aa8eb49a2e1c6ec9cc5e33f2617a607f2bcf7a70465febbd5744
SHA5128ddf065acab28522f6cde0698b769f4078e167c9bdc1e88f6c0974b21668c07d44e4c83bf7a1863b1837b782213e04e59d07ba2cde6bb34f7f159d1242bec5e5
-
Filesize
585KB
MD5edd65f78ef00c65c4c1aaf6b0008bb6e
SHA115c89a818f1f77e37c5834ef0c1206ae503b88fe
SHA25639f10bd32de22b4495d01191017485261a937ed1b60373720ae831feed973031
SHA5120cf6ad704170fcd7c3b62ad2a7015e9f5ce520fe26533a83729b4bc9554d2b2bc7038afb84fe1207379d9af983f9bee263fa1b78fcea46ddac77785fa7d173dd
-
Filesize
24.5MB
MD5a5ca2d3b20cf191139a47d7261916d9e
SHA15d56e08cc55731f96db03911dba96dcdf22bcac8
SHA256ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833
SHA512e008b76d8040ef039424e6f7eec37b866fc7ab71d1cb11d839b4d4449758b3b8174249c353d1726ed736cb9c854cafda7648aee7a12c93d8a8e0cd0013a0c3ad
-
Filesize
22.4MB
MD5317c5fe16b5314d1921930e300d9ea39
SHA165eb02c735bbbf1faf212662539fbf88a00a271f
SHA256d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
SHA51231751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
Filesize
9.5MB
MD56c21e9957b540c1fc5c6c30f991423dd
SHA13937d74580a14bb8debd9c763fb1816cb26b881d
SHA256fd6b4896e31a516c1aceae5d2e82822dc0efdecbcebf882b2875e57ce9e26cb0
SHA512f4b7825e1cd7267b2bc9e8801c19ae72b76a0269dd0fb144303494882eb68bc4f0e2d8b6766f80252b6acd12090a6b6f0c4bc5e2c089d35a24e0a64de2bda5ba
-
Filesize
846KB
MD5f8f811ccb9afad9bca6d6e7d0628f9ad
SHA1eafa751da7d1081de2e4e42ffba74ceefb2480a1
SHA256b9b2f46a9253743f3f6a8f13fe76ae0ae14390bae49318e72de49e78eca532e2
SHA512424eff8121080df371e6d7fefa36fef0f2d7079c733fe1eeffcc3a42758cb355f200f62761d00af75d1b4e1bb32278ad0689b4183b68f338f4752ba50f4bdb10
-
Filesize
45B
MD51d4de1822af1bb3991e6eb67a12a69b5
SHA141c9d68bf5ad00072b9e6b0c02e8a71fce2dbd52
SHA256ca791170602f2254493246550438de14c3e7b61b72b8bd4079f70178a1aaa102
SHA512c59dd96701d41b281e24e602aab78bc8db77070365dea78ca2e72bc8a772121dbd110f67410490d8d1bee1b25edbf05d3517c357868f471aa7b8c652cf0ade50
-
Filesize
586KB
MD5f1c4f9d91cf5e97efa0a802c780b265c
SHA1d8ca79f27a04281cc1f02f270d635d075c042814
SHA2564cf191dd97fbfef18e6386daef35b4b46861cf7f601a2f24aefe7821cca8d66d
SHA51288718c7a22039fab56161a1841a6e8901f4e2193f21b6cc6e407d2c5b2ed1f025ae02bb4fe8c0bc8ea1d38813ef2ff4e3c1b6075ec08e9b4ebba0822ca827001
-
Filesize
586KB
MD5a68f7fe8b23ba3bf3c7b1a2d124844e2
SHA1ce62cb9f97861428f89196dd3cd72c894e72c32d
SHA256f6cffcf62150d8b4ebbec9c70f348df6c47bba8336fd4f2b81cfad196acc24cb
SHA512ca52a390b50f2430cd63f34f668410528c62fb50dc34e1c22b85e0b82726653a0ee76ffb50d60c6bec9300ad8b5d6df14140bca70a61646821adb1aa133eb2ff
-
Filesize
640KB
MD5b9dd5fe40de02db412773cc02135fad9
SHA18edfeebf975fea04b5aecda4557fd7edf5d69548
SHA256a7aefb8007a5c919ee7e5c60cf7b39712688a6962d7a4d5b20b8f21e5c3719cd
SHA512c66352a44a48414f1478bde2ebca65b232178570c44a79a0822e35014b475d7ff3086cba5642f1c500f52a255b321581bfbe614702b554deed0211a35b3c2b6f
-
Filesize
785KB
MD526b878c0bb48e4f0619753be1fefb0a0
SHA123596141bec9146e1a3eb3602114d4f0489f47b6
SHA25616c8f4bc7279238bc1395e11474d5c00c0b2baf489dd0faf33479b37b36211a1
SHA512726fed8212c439c476347ea108808834550834d8b75bf8df15347582d70df3cb6d3b435d94440aa1bb06c7e7a8dc9b1b969df9d344444ea5f44367e249ee7e68
-
Filesize
683KB
MD5becbca36306f3a77833e458addf17816
SHA151df57f96256f1ac0f97ae96e14dd97023a8976a
SHA256a57afb8488efc3bc9134e970ef9655e8cbc88fdce83825e7000849b85167d8c2
SHA512533c4843a1956d86e6deb8404ca7072daabe9478de5d3aa4377f6bb3c4f40378ebb4eb1cec7c6dbf9000956bc0e5f2204d0667d32d9e843964665ab12edfc20e
-
Filesize
755KB
MD5266c86cd82c3194a314dd74cd8fe5daa
SHA1be9032f104acee72a76af1789b19a56d367f408a
SHA256f0ddd5c37d961d688110688e6611d81c90616f5c2e4d24c0b1899025a003a1e3
SHA512b9fd44bd9e33e032d7ef7d8b5b93393b9a6c8cdb56360061490dc7926b05881a325b4171e18353125f9ba56f5fe915e55b0c0e316eab81739c0120047a833d63
-
Filesize
746KB
MD5ec1bca379be727e25a62bcf4929c39d1
SHA1fd8d2a90bafde511f6e81807adc2e100bde27283
SHA256c40128aebb2ceacd59c2d4e8d89453f97065ccebe60c2305495d5b8a4e2e0fc4
SHA512d614f00d4d9bba248588e9bdcffcdf764e8613d4025d6aa66b226594178d1f6d527bc0e62fe21591c742625d16289060d3d09c2c0c9db430089d3634ec746815
-
Filesize
13.8MB
MD58360a6245b4ae84a5b6e4784d7802472
SHA1192f6d4a68ec867c5919a5d5fd4c782bf9c39127
SHA256393732bdd7df3cbbcc35dca3397178466f32de8ebd266ad5791c000288771bc5
SHA51238b4630ab40c84f822fe860038c4c48d0ea31ceaa23d05d01f599c08f44a3fe45113f4386f1874799dfb15e7d7930c369c2eeba11129adfa3f9154264cbcc63b
-
Filesize
101KB
MD59335f2504579c0f73451909027443727
SHA1a4b7e77f6d95eba16a5b17079815da9792a7489a
SHA2567f903cbab9b62a751f24aaf2d0198999ab4aee482a47f92ac2765f8c7ad77bd2
SHA51263bde4de15d3b33b7c7b509c7d059cde76e9541288d469d00090677596dfeff9bcb15e0c0a567dd65b9ba0c6de716c67c0914c17ed9c9144b434529bdd2eddb0
-
Filesize
585KB
MD5c5c1ea1900b909bc8c0735b74f2504d2
SHA107fb26c88f6314cca2805315879f7f2dbbee0188
SHA25629d66c321009cc82ca379e3000375120299ea410a7c529b3cf5aaabfbc48abc2
SHA512ef16723664500c75aa63dc9aa5eac9c4a7f1cb6c40df842659dd0b6ca3faa9fafe4b72ccd34d72f1df1f20b7d0b0091fbbd398e4703b52059ee854311f743b7f
-
Filesize
765KB
MD5e889a77cc88bb18d715d71b0b7299c3c
SHA18d55cbe8f51fd02619e97dab126238e4c1f970e9
SHA2569eaf693c8eb41ff809960380f1a27b9341533f3ac13c5bd6317fc98dde473aaf
SHA512bc3d1476f4f5e852291c98a3e05dd44a87a21d6046093671afa0ad24264a188a8298e685005006649a88447a841e256a8b7ff6a64542a5631da30758b15d1d10
-
Filesize
17.8MB
MD561bcb94052e57f07e8c662a80d8c29c1
SHA1db9d2e9e37eddedc1722727e8ce5a0a242a9ff10
SHA2563b0cfdd500288507ec287e0e2f33d7acb7a2bcad1537fcfb29a47a4fa7cc23a6
SHA5127f9f9c2c6cd5dd49baf6791808e5a31c9e4726d27f87aaad8e2df75ab2a0dbf20956d0bab8761a9e742d1fa85052f9f7f0ae8e6cf269a0761053786e547935a1